Across
- 4. | Gaining unauthorized access to computer systems.
- 5. Theft | Stealing someone’s personal information to impersonate them.
- 11. | Malware that locks files and demands payment to unlock them.
- 12. of Service | An attack that floods a system with traffic to crash it.
- 13. | Malicious software that attaches itself to programs and spreads when they run.
- 14. | Definition
- 15. of Things | Network of physical devices connected and communicating over the Internet.
- 16. | Sending fake messages to trick people into giving away private information.
- 20. | Any software designed to harm or exploit systems.
Down
- 1. | Phishing attacks carried out through text messages.
- 2. | Using hacking for political activism or protest.
- 3. | A network of infected devices controlled by hackers.
- 4. | A serious security flaw in encryption software that exposed user data.
- 6. | A harmful program disguised as a legitimate one.
- 7. | The process of scrambling data to protect it from unauthorized access.
- 8. | A hidden method to bypass security and access a system.
- 9. | Redirecting users to fake websites to steal their data.
- 10. | Software that secretly gathers user information without consent.
- 17. Engineering | Manipulating people into revealing confidential data.
- 18. | A program that spreads by copying itself without needing a host file.
- 19. | A team that responds to major cybersecurity incidents.
