Most Dangerous State Sponsored Hacking Group Crossword

12345678910111213141516171819202122
Across
  1. 5. Facebook, Twitter, Instagram
  2. 7. A flaw or weakness in a computer system that could be exploited to violate the system's security
  3. 9. Widely used in-home network technology that allows for wireless
  4. 14. The "I" in the C-I-A Triad; protection from unauthorized changes.
  5. 15. A sequence of words or text used to control access to a computer; similar to a password.
  6. 16. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  7. 17. The boss and head of state
  8. 20. Verifying identity
  9. 21. Hardware or software designed to prevent unauthorized access to or from a private network.
  10. 22. The attacks were sourced from a botnet architecture leveraging compromised hosts in South Korea. The DDoS attacks were targeting South Korean government websites as well as the network of U.S. Forces Korea (USFK).
Down
  1. 1. The movie that caused the 2014 Sony Pictures attack.
  2. 2. Threatening behavior facilitated through electronic means such as texting.
  3. 3. The process of taking plain text and scrambling it into an unreadable format.
  4. 4. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  5. 6. amount stolen from the Bank of Bangladesh
  6. 8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. 10. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  8. 11. Unauthorized access to a network, information systems, or application.
  9. 12. A fraudulent email purportedly from a reputable company attempting to get personal information.
  10. 13. Security tool that creates a secure, encrypted connection between you and the Internet.
  11. 18. The address of a webpage. Check the validity of it before clicking on it.
  12. 19. The "A" in the C-I-A Triad. It ensures authorized users have access.