Cyberattacks

1234567891011
Across
  1. 5. disguises and intercepts
  2. 6. Voice over IP attacks
  3. 8. automating all combinations of possible password
  4. 10. one who acquires Bitcoin by solving math
Down
  1. 1. damaging software without user’s consent
  2. 2. unmonitored logging of pressed keys
  3. 3. a malware that encrypts file in exchange for ransom
  4. 4. cellular users attack
  5. 6. replicates when infects a host computer
  6. 7. targeted cyber-attack (first word only)
  7. 9. a standalone malware
  8. 11. large-scale cyber-impersonation