Across
- 2. malicious act of collecting and publishing and individuals private info
- 4. trying many passwords until one works
- 6. fake emails or messages that trick users into giving information
- 7. force trying many passwords until one works
- 11. malicious code that attaches to legitimate files
- 12. networks of infected devices controlled by an attacker
- 13. phishing via text messages
- 14. recoding keystrokes to steal credentials
- 15. a cyber-enabled attack that involves sending a SWAT team to unsuspecting victim
Down
- 1. displays unwanted ads, often tracking user behavior
- 3. malware disguised as legitimate software
- 5. pretending to be a trusted device by faking an IP address
- 8. encrypts files and demands payment
- 9. luring victims with something enticing
- 10. self replicating malware that spreads across networks
- 11. phishing via phone calls
