Across
- 2. What is the practice of disguising information to make it unreadable by unauthorized individuals?
- 4. What is the most popular IDE among automation developers?
- 7. What operating system was Rpm Arming designed for?
- 8. A virus that encrypts your data and you have to pay to receive the encryption key.
- 10. What is the term for a type of cyber attack that targets vulnerabilities in web applications, often through injecting malicious code?
Down
- 1. This type of malware uses a combination of encryption, evasion techniques, and anti-analysis mechanisms to avoid detection and analysis.
- 3. What is the practice of manipulating or falsifying data to deceive or mislead computer systems or users?
- 5. Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cyber crime.
- 6. A former name for DPA
- 9. What is the term for a type of cyber attack that involves sending an overwhelming amount of traffic to a target system to disrupt its normal functioning?
