Cybersecurity Scramble

1234567891011121314151617
Across
  1. 6. Multiple sources sending an overwhelming amount of packets to crash the device.
  2. 8. Holds computer data hostage in exchange for money.
  3. 9. Requires end-user initiation.
  4. 10. Sending an overwhelming amount of packets to crash the device.
  5. 12. Phishing by impersonating businesses.
  6. 13. A _ attack that attacks a vulnerability on a network unknown to the vendor.
  7. 14. Triggers malicious code.
  8. 15. Creates backdoors in the operating system.
  9. 16. Replicates using network vulnerabilities
  10. 17. Sending unauthorized messages to another bluetooth device.
Down
  1. 1. Scares the victim into infecting their system.
  2. 2. Phishing using calls.
  3. 3. Creates ad-popups for the authors to generate revenue.
  4. 4. Copying a victims information from bluetooth.
  5. 5. Malware that carries out operations pretending to be something else.
  6. 7. Phishing using texts.
  7. 11. Lets the attacker view the actions of the user and their data.
  8. 16. Phishing that targets high profile individuals.