Across
- 6. Malicious code that encrypts certain files on a computer and demands some payment to release them.
- 8. In the early days of computing, a hacker was just a "creative __________."
- 9. Type of hacker that is known for exploiting vulnerabilities to improve security.
- 12. Malicious code that logs activity on a computer and sends it to a remote server.
- 14. Emails that imitate large companies to exploit trust and convince users to click on malicious links.
- 16. A common target for identity thefts thanks to their public display of addresses, birth dates, and work histories.
- 17. Term with a positive meaning in the 70s that shifted to negative today.
- 18. Malicious code that spreads through vulnerabilities across computers.
- 19. Convincing people to release potentially sensitive information through manipulative tactics.
Down
- 1. Malicious code that provides an alternative access route to a computer that is only known and used by a hacker.
- 2. Exploiting DNS servers to plant malicious websites in the place of a common FQDN.
- 3. A daylong event for developing innovative new software and hardware.
- 4. A group of computer infected by malicious code that causes them to act in response to a hacker's control.
- 5. Vladimir _____ stole $400,000 in what is believed to be the first online bank robbery.
- 7. Term for manipulating the telephone system, often used to make free calls.
- 9. Movie that was inspiration for many young hackers attempting to break in to Department of Defense computers.
- 10. Malicious code that acts as a software application.
- 11. Retailer whose data was compromised due to a phishing attack on their HVAC provider.
- 13. Acronym for an attack that involves overwhelming servers to restrict access for users.
- 15. One of the most destructive viruses, affecting Ford, the Pentagon, and the British Parliament, among others.
