Across
- 5. malicious software executed by trigger
- 7. nefariously spreads via email attachments
- 9. stores and manages credentials
- 11. spreads computer to computer
- 12. malicious encryption demanding payment
- 13. designed to exploit macros
- 16. disguised program intending to steal
- 17. finds weaknesses to exploit systems
- 20. stored small text files
Down
- 1. targeting systems to overwhelm
- 2. secretly recording private device activity
- 3. new phone using stolen data
- 4. Targeted advertisements from online activity
- 6. Attack Botnet used to target website
- 8. Private Network within Public Network
- 10. personalized attacks luring victims
- 14. mass stolen credentials gaining access
- 15. layered disguise for unintended clicking
- 18. remotely controlled devices launching attacks
- 19. monitors and controls network traffic