Cybersecurity Month

123456789
Across
  1. 2. A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
  2. 4. A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
  3. 6. a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
  4. 8. A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
  5. 9. Finding and exploiting vulnerabilities in a system or on a website
Down
  1. 1. The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
  2. 3. This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
  3. 5. A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
  4. 7. disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software