Across
- 6. Multiple sources sending an overwhelming amount of packets to crash the device.
- 8. Holds computer data hostage in exchange for money.
- 9. Requires end-user initiation.
- 10. Sending an overwhelming amount of packets to crash the device.
- 12. Phishing by impersonating businesses.
- 13. A _ attack that attacks a vulnerability on a network unknown to the vendor.
- 14. Triggers malicious code.
- 15. Creates backdoors in the operating system.
- 16. Replicates using network vulnerabilities
- 17. Sending unauthorized messages to another bluetooth device.
Down
- 1. Scares the victim into infecting their system.
- 2. Phishing using calls.
- 3. Creates ad-popups for the authors to generate revenue.
- 4. Copying a victims information from bluetooth.
- 5. Malware that carries out operations pretending to be something else.
- 7. Phishing using texts.
- 11. Lets the attacker view the actions of the user and their data.
- 16. Phishing that targets high profile individuals.