CyberDSA D1

12345678
Across
  1. 1. Malicious software designed to damage systems
  2. 3. Malicious program disguised as legitimate software
  3. 5. Incident where unauthorized access to data occurs
  4. 7. Fraudulent emails or messages to steal credentials
  5. 8. Hostile action aimed at exploiting vulnerabilities
Down
  1. 1. Organization behind the ATT&CK framework for cyber threats.
  2. 2. Malware that encrypts files and demands payment
  3. 4. Intelligence gathered from publicly available sources
  4. 5. Network of compromised devices controlled remotely
  5. 6. Decoy system set up to lure attackers