CYBER THREATS

12345678910
Across
  1. 2. Attack A security breach where an attacker intercepts and potentially alters the communication between two parties without their knowledge.
  2. 5. A technique where attackers impersonate another device, user, or website to deceive individuals or systems, often for malicious purposes.
  3. 6. A cyber attack that redirects a website’s traffic to a fraudulent website, often to steal sensitive information like passwords and credit card numbers.
  4. 8. Threat A security risk posed by individuals within an organization who misuse their access to harm the company or its data.
  5. 10. Attack A cyber attack that occurs when a user unknowingly visits a compromised website that automatically downloads malicious software to their device.
Down
  1. 1. Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.
  2. 3. The act of taking advantage of a vulnerability in a system or software to gain unauthorized access or perform harmful actions.
  3. 4. Scripting (XSS) A vulnerability that allows attackers to inject malicious scripts into web pages viewed by others, often to steal sensitive data.
  4. 7. Attack A cyber attack that targets a vulnerability in software or hardware that is unknown to the vendor or security community, leaving no time for a fix or patch.
  5. 9. Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information.