Security

1234567
Across
  1. 3. General term for malicious software that changes the target system's behavior, destroys data, or spies on the user. Can also propagate across a network.
  2. 4. Trying multiple combinations of credentials against a target system
  3. 6. Hidding malicious software inside seemingly legitimate software
  4. 7. An email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion
Down
  1. 1. An attack where the victim is asked to pay a ransom to do not have their data publicly shared, or to unlock a system that is being held by malicious software (and thus, rendered useless)
  2. 2. Intercepting network traffic in an attempt to find sensitive information (Hint: it's the same name as if you were listening to your neighbors having a private conversation)
  3. 5. one of the most important things you should do on your system to prevent attacks. The sysadmin and security teams will appreciate if you do this