Across
- 2. Technique to rapidly change IP addresses of malicious hosts.
- 5. Malware that locks files and demands payment.
- 8. Phishing carried out through voice calls.
- 10. Phishing carried out through SMS messages.
- 11. A person or entity trying to break into systems.
- 13. Term used to describe harmful or hostile software/code.
- 14. Technique to send data secretly through another network.
- 15. Deceptive act intended to gain unlawful advantage.
Down
- 1. The reason why attackers launch cyberattacks.
- 3. A server used to hide the real identity of a user.
- 4. A network of compromised computers controlled remotely.
- 6. The underlying network used to support cyberattacks.
- 7. Fraudulent attempt to steal information via fake emails/websites.
- 9. Software designed to detect and remove malware.
- 12. Fake or deceptive programs pretending to be legitimate.
