Across
- 4. With _____, the victim’s system is held hostage until they agree to pay money to the attacker.
- 5. A _____ attack occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.
- 8. In a _____ attack, a hacker embeds malicious code into an insecure website.
- 9. A _____ attack gets its name from the “brutish” or simple methodology employed by the attack. The attacker simply tries to guess the login credentials of someone with access to the target system.
Down
- 1. A _____ attack uses a malicious program that is hidden inside a seemingly legitimate one
- 2. _____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
- 3. A _____ attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
- 6. _____ infects a computer and changes how it functions, destroys data, or spies on the user or network traffic as it passes through.
- 7. With _____, a hacker alters DNS records to send traffic to a fake website.