Tools and Concepts of cyber space

12345678
Across
  1. 2. A type of cybercrime where someone's personal information is stolen and misused
  2. 3. An attack that exploits memory allocation errors to overwrite system data
  3. 4. Cracking A technique that tries every possible password combination until the correct one is found
  4. 7. A type of malware that can replicate itself and spread without user intervention
  5. 8. A technique used to hide information within an image, audio, or video file
Down
  1. 1. A malicious program that records keystrokes to steal passwords and other sensitive data
  2. 4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  3. 5. Injection A code injection attack that targets databases through user input fields
  4. 6. An attack that overwhelms a system with excessive requests to make it unavailable