Across
- 4. The US and Israel carried out a cyber-attack against this country.
- 6. Controls the hardware and applications on a computer for the user.
- 9. What does the A in CIA stand for
- 10. Malware that monitors your actions on a computer
- 12. The first era of hacking is called the joy of what?
- 14. A social engineering attack where an attacker appears to be someone legitimate to trick you into giving up information.
- 17. A company which hackers breached in 2013 and gained access to 40 million credit card numbers.
- 19. A group of computers that have a virus installed on them and are controlled by a hacker.
- 20. Written defamation
Down
- 1. Another name for two-factor authentication
- 2. what does the C in CIA stand for?
- 3. Malware that encrypts files on your computer and demands payment to decrypt them.
- 5. Hacking for a political cause
- 7. Devices installed by thieves at places where credit cards are commonly used meant to steal credit card numbers.
- 8. Unique biological characters
- 11. A piece of software designed to exploit system flaws.
- 13. A piece of software that inserts itself into other software.
- 15. what does the I in CIA stand for
- 16. A bug in OpenSSL in 2012
- 18. A virus created to damage centrifuges in Iran.