Across
- 5. A hidden method to bypass security and access a system.
- 6. A network of infected devices controlled by hackers.
- 7. Redirecting users to fake websites to steal their data.
- 10. Manipulating people into revealing confidential data.
- 11. An attack that floods a system with traffic to crash it.
- 12. Any software designed to harm or exploit systems.
- 13. Stealing someone’s personal information to impersonate them.
- 14. Software that secretly gathers user information without consent.
- 17. Sending fake messages to trick people into giving away private information.
- 18. A harmful program disguised as a legitimate one.
- 19. A program that spreads by copying itself without needing a host file.
- 20. A team that responds to major cybersecurity incidents.
Down
- 1. Phishing attacks carried out through text messages.
- 2. Using hacking for political activism or protest.
- 3. A serious security flaw in encryption software that exposed user data.
- 4. Gaining unauthorized access to computer systems.
- 8. The process of scrambling data to protect it from unauthorized access.
- 9. An unmanned aerial device that can be vulnerable to hacking.
- 15. Malware that locks files and demands payment to unlock them.
- 16. Malicious software that attaches itself to programs and spreads when they run.
