Across
- 2. A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
- 4. A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
- 6. a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
- 8. A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
- 9. Finding and exploiting vulnerabilities in a system or on a website
Down
- 1. The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
- 3. This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
- 5. A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
- 7. disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software