Cyber Security Unit-4 Puzzle

123456789101112131415
Across
  1. 2. Stealing data entered into online forms.
  2. 5. Malware that stays active after reboots.
  3. 8. Add-on program that extends browser functionality, often abused.
  4. 10. Technique of hiding malicious code to avoid detection.
  5. 12. Shared library file targeted in injection attacks.
  6. 13. Special system rights that attackers try to escalate.
  7. 15. Stealthy software designed to hide the presence of malware.
Down
  1. 1. Stealing security tokens to impersonate a legitimate user.
  2. 3. Malware that secretly monitors and collects user data.
  3. 4. Malicious program that attaches itself to files and spreads.
  4. 6. Application used to access the web, targeted by malware.
  5. 7. Process of gaining higher access rights than intended.
  6. 9. Attack that intercepts communication between two parties.
  7. 11. Self-replicating malicious code that spreads across systems.
  8. 14. Virtual Machine environment bypassed or checked by malware.