Across
- 5. A self-propagating malware that does not need a host program.
- 8. A type of malware that self-replicates and spreads between computers.
- 9. A malicious program disguised as legitimate software.
- 10. Phishing attempts conducted via SMS messages.
- 11. A system that SQL injection attacks target.
- 13. Manipulating people into divulging confidential information.
- 15. Malware that encrypts data and demands payment for its release.
- 17. Software that automatically displays unwanted advertisements.
- 18. Creating a false scenario to trick someone into giving information.
- 19. A DoS attack launched from multiple compromised systems (acronym).
- 20. An attack that tries every possible combination to guess credentials.
Down
- 1. Malware that collects information about users without their knowledge.
- 2. An attack aimed at disrupting a service by overwhelming it (acronym).
- 3. An attack that exploits vulnerabilities in database queries.
- 4. An attack that floods a system with traffic to make it unavailable (acronym).
- 6. Malicious software designed to disrupt or damage computer systems.
- 7. A social engineering attack using deceptive emails or websites to trick users.
- 8. Phishing attempts conducted via voice calls.
- 12. Illegally taking data from a system.
- 14. An attack where data is secretly monitored during transmission.
- 16. A social engineering technique involving looking over someone's shoulder to steal information.
