Across
- 1. social engineering to steal data
- 3. Hacker that attacks for self-interests
- 4. malware designed to acquire money
- 5. malicious software
- 8. malware that changes and corrupts
- 9. convert encrypted data to plain text
- 13. monitors network traffic
- 14. 2+ computers sharing resources
- 16. network of computers for attacks
- 17. seemingly harmless malware for infection
- 18. unauthorized access to a system
- 20. process of identifying a user
Down
- 2. internet protocol address
- 6. Hacker that defends others
- 7. malware that's designed for monitoring
- 10. leverage a vulnerability for cyberattack
- 11. testing system without prior information
- 12. gaining as much info before penetration
- 15. gathering of hackers for practice
- 19. flood bandwidth of targeted system