Types of cyber attacks

12345678910111213
Across
  1. 2. Injection Attack that inserts malicious SQL queries into input fields to manipulate databases
  2. 4. Phishing attack conducted via SMS messages to deceive users into clicking malicious links
  3. 6. Targeted phishing attack aimed at a specific individual or organization using personalized information
  4. 7. Site Scripting Injection of malicious scripts into trusted websites viewed by other users
  5. 8. Injection Attack that executes unauthorized system commands via vulnerable applications
  6. 10. Phishing attack specifically targeting high-profile individuals such as executives or CEOs
  7. 13. Malware that encrypts data and demands payment for its release
Down
  1. 1. Malware disguised as legitimate software to trick users into installing it
  2. 2. Malicious software that secretly monitors and collects user information
  3. 3. Voice-based phishing attack where attackers use phone calls to steal sensitive information
  4. 5. Fraudulent attempt to trick users into revealing sensitive information like passwords or credit card details through fake emails or websites
  5. 9. Software designed to disrupt, damage, or gain unauthorized access to systems
  6. 11. Software that automatically displays unwanted advertisements, often tracking user behavior
  7. 12. Self-replicating malware that spreads across networks without user interaction