Across
- 2. A flaw in a computer program that can be exploited.
- 3. A virus that infected 80% of federal agencies and is considered one of the most destructive ones.
- 6. Purposefully accessing a computer without permission.
- 8. Malware that watches what the user is doing
- 9. A group of compromised computers that communicate with a central control server.
- 15. What the internet began as; as a collection of universities, government agencies, and companies.
- 17. A vulnerability in OpenSSL that allowed attackers to overread a buffer to get information off of systems running the software.
- 19. A program that allows an attacker to access a computer without going through the proper access route.
- 20. Faking where it looks like communications come from
Down
- 1. The act of luring people to a fake website used to collect data.
- 4. A malware that requires a ransom to be paid to decrypt the user's data.
- 5. A term for phone hacking.
- 7. A digital attack used by a nation state.
- 10. A type of attack that that impersenates a legitimate person or organization for malicious purposes.
- 11. Software that causes harm.
- 12. A computer program that puts itself on other computers
- 13. Hacking for political purposes.
- 14. A peice of software to fix a bug or vulnerability in a computer program.
- 16. An acronym for internet connected devices
- 18. A type of attack (acronym) that prevents people from accessing computer resources.
