Across
- 2. Hacking carried out for political or social activist purposes.
- 4. Redirecting website traffic to a fake site to steal credentials.
- 5. Phishing conducted over voice calls or voicemail.
- 7. An unauthorized intrusion into a computer or network.
- 8. Self-replicating malware that spreads across networks without user action.
- 10. A published false statement that damages someone's reputation.
- 14. Malware that encrypts a victim's files and demands payment for their release.
- 17. Decoy systems designed to lure and detect hackers.
- 19. Ethical hackers who test systems legally to find vulnerabilities.
- 20. Abbrv. An attack that floods a system to make it unavailable to users.
Down
- 1. Phishing carried out via SMS text messages.
- 3. Gaining unauthorized access to computer systems or networks.
- 6. A person who exploits weaknesses in computer systems.
- 9. Any software intentionally designed to cause harm to a system.
- 11. A hidden method of bypassing normal authentication in a system.
- 12. Using physical traits like fingerprints or facial recognition for identification.
- 13. Malicious code that attaches to files and spreads when executed.
- 15. Fraudulent emails tricking users into revealing sensitive information.
- 16. Abbrv. US law criminalizing unauthorized computer access.
- 18. US law expanding surveillance powers to combat terrorism post-9/11.
