Across
- 3. General term for malicious software that changes the target system's behavior, destroys data, or spies on the user. Can also propagate across a network.
- 4. Trying multiple combinations of credentials against a target system
- 6. Hidding malicious software inside seemingly legitimate software
- 7. An email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion
Down
- 1. An attack where the victim is asked to pay a ransom to do not have their data publicly shared, or to unlock a system that is being held by malicious software (and thus, rendered useless)
- 2. Intercepting network traffic in an attempt to find sensitive information (Hint: it's the same name as if you were listening to your neighbors having a private conversation)
- 5. one of the most important things you should do on your system to prevent attacks. The sysadmin and security teams will appreciate if you do this
