Cyberattack Types and Techniques

12345678910111213141516
Across
  1. 3. Hostage code
  2. 4. Self replicating without input
  3. 8. Pre-OS machine code
  4. 9. Set of instructions for multiple apps
  5. 10. First virus made by 9th grader
  6. 12. Disguised Code
  7. 13. disk old magnetic storage
  8. 15. Total access
  9. 16. Data collecting code
Down
  1. 1. a representation of a programs source code
  2. 2. code that bypasses authentication
  3. 5. Unexpected weakness
  4. 6. Malicious Code
  5. 7. Protection tampering
  6. 10. leverage weaknesses
  7. 11. Logical Trigger
  8. 14. Iterative malware code