Cyber Security Unit-2 Puzzle

123456789101112131415
Across
  1. 2. Technique to rapidly change IP addresses of malicious hosts.
  2. 5. Malware that locks files and demands payment.
  3. 8. Phishing carried out through voice calls.
  4. 10. Phishing carried out through SMS messages.
  5. 11. A person or entity trying to break into systems.
  6. 13. Term used to describe harmful or hostile software/code.
  7. 14. Technique to send data secretly through another network.
  8. 15. Deceptive act intended to gain unlawful advantage.
Down
  1. 1. The reason why attackers launch cyberattacks.
  2. 3. A server used to hide the real identity of a user.
  3. 4. A network of compromised computers controlled remotely.
  4. 6. The underlying network used to support cyberattacks.
  5. 7. Fraudulent attempt to steal information via fake emails/websites.
  6. 9. Software designed to detect and remove malware.
  7. 12. Fake or deceptive programs pretending to be legitimate.