Domain One Review

1234567891011121314151617181920212223
Across
  1. 6. Using voice calls to trick users into divulging information
  2. 8. A program that collects victim information prior to an attack
  3. 9. State-sponsored cyberattackers who are often among the most dangerous.
  4. 11. Cyberattackers who bring attention to various causes.
  5. 15. A type of attack that overwhelms a network or device with traffic
  6. 17. sending a message to a victim that is tailored to that victim's personal information
  7. 18. A type of attack that sees the attacker intercept data while it transmitting from customer to service provider
  8. 19. A program that infects other files to do damage.
  9. 20. An acronym for low-cost, easy-to-use devices that are often not hardened and make for good targets for cyberattacks
  10. 22. A DoS attack that uses a botnet to make responding to the attack much more difficult.
  11. 23. Criminals who carry out illegal activities that target or use computer equipment.
Down
  1. 1. Attacks that happen in the physical world (including natural disasters)
  2. 2. Cyberattackers who have elevated privileges and internal knowledge.
  3. 3. Technical controls are worthless without ____________ controls.
  4. 4. Using SMS messages to trick users into divulging information
  5. 5. Sending a message to a victim asking for information or action
  6. 7. An acronym for cyberattackers who break into environments and stay there for long periods of time.
  7. 10. A program that encrypts important files and demands a payment for a decryption key
  8. 12. Waiting for an authorized user to open a door and following behind
  9. 13. "New" hackers who have little hacking skills but large numbers.
  10. 14. A type of attack that targets the weakest link of any cybersecurity environment
  11. 16. A malicious program disguised as a useful program
  12. 21. A self-copying program that tries to spread on its own