Threats to computer systems and networks (J277)

1234567891011121314151617181920
Across
  1. 5. A self-propagating malware that does not need a host program.
  2. 8. A type of malware that self-replicates and spreads between computers.
  3. 9. A malicious program disguised as legitimate software.
  4. 10. Phishing attempts conducted via SMS messages.
  5. 11. A system that SQL injection attacks target.
  6. 13. Manipulating people into divulging confidential information.
  7. 15. Malware that encrypts data and demands payment for its release.
  8. 17. Software that automatically displays unwanted advertisements.
  9. 18. Creating a false scenario to trick someone into giving information.
  10. 19. A DoS attack launched from multiple compromised systems (acronym).
  11. 20. An attack that tries every possible combination to guess credentials.
Down
  1. 1. Malware that collects information about users without their knowledge.
  2. 2. An attack aimed at disrupting a service by overwhelming it (acronym).
  3. 3. An attack that exploits vulnerabilities in database queries.
  4. 4. An attack that floods a system with traffic to make it unavailable (acronym).
  5. 6. Malicious software designed to disrupt or damage computer systems.
  6. 7. A social engineering attack using deceptive emails or websites to trick users.
  7. 8. Phishing attempts conducted via voice calls.
  8. 12. Illegally taking data from a system.
  9. 14. An attack where data is secretly monitored during transmission.
  10. 16. A social engineering technique involving looking over someone's shoulder to steal information.