Across
- 2. a type of malware that has many similarities to a virus. The main difference is that this type does not need other resources to evolve and cause extensive harm
- 5. the intentional access of a system to which the user has not been authorized access by a designated party
- 6. types of information that threat actors use in order to build profiles on their victims. This type of data can be collected using publicly available, mostly online, resources. Some versions of this information include social media posts, public database records and etc.
- 9. (3 words separated by '-') a type of cyber-attack that sends a server an influx of traffic to bog down the server and cause the service to malfunction preventing users from accessing or using the service
- 11. a type of software that allows for circumvented access to a system without having to abide by a system's security features. They are often installed to aid law enforcement investigations but most times they are installed in order to provide threat actors with an easy way back into the system while they perform reconnaissance or the actual attack.
- 13. a type of malware that attaches to and spreads from resource to resource by self-replication
- 14. the manipulation of telephone communications to bypass the need to pay for phone calls or obtain access into other systems on the network
- 15. the ideology of hacking for “the greater good”. These types of hackers are considered white-hat hackers who attack based on political motivations.
- 18. this is a type of malware that is designed to monitor a victims actions online. Some types of this malware can log a victims keystrokes, and activate webcams on victims computers or mobile devices. Then the information is logged and then sent to a threat actors designated server space.
- 19. a device installed into card swipers found on POS terminals and ATMS to collect users credit/debit card numbers and PIN numbers to conduct credit card/debit card fraud on the victim.
Down
- 1. a tactic of cybersecurity professionals and threat actors where they present as a trusted/reputable source to solicit information or gain an advantage within their attack or investigation.
- 3. this is a type of malware that encrypts files on a victim's computer and in order to decrypt them the victim would be prompted to pay by a deadline or run the risk of all the data being released or destroyed
- 4. (3 words separated by '-') these types of threat actors perform malicious activities with intent to cause harm to their victims. Their motivations are most times aligned with financial gain or embarrassment of the victim.
- 7. (2 words separated by '-') a type of malware that is introduced into a victims system by running an infected application. The malware performs and initiates other types of malware attacks like installing a virus or sending spam emails.
- 8. a tactic used by threat actors to gather information to build a dossier on a victim. They obtain information by sending mass emails or text that are disguised as being sent by legitimate organizations (i.e. Amazon, PayPal, the IRS etc.) messages to get a victim to either provide information or click a link and provide their information.
- 10. any criminal activity that is conducted against a computer system, targeting a computer system or is being used to obtain data for use in crime via the internet.
- 12. (3 words separated by '-') these types of threat actors perform hacking activities designed to identify vulnerabilities and improve overall system security
- 14. a software fix that mitigates a known vulnerability within a computer system
- 16. a weakness or flaw that threat actors exploit to execute their attacks on a system
- 17. (2 words separated by '-') the act of manipulating people in order to obtain personal information, behavior patterns or interests of the victim that can then be used to laterally build an attack against the victim
