Across
- 5. Attack inserting malicious SQL queries.
- 7. Malicious software designed to harm systems.
- 8. Impersonating a trusted source.
- 10. Intercepts communication between two parties.
- 12. Fraudulent attempt to obtain sensitive information via email.
- 14. Locks data and demands payment to restore access.
Down
- 1. Records keystrokes secretly.
- 2. Injects malicious scripts into web pages.
- 3. Malicious program disguised as legitimate software.
- 4. Voice-based phishing attack using phone calls.
- 6. Attempts all possible password combinations.
- 9. Phishing attack conducted via SMS messages.
- 11. Secretly monitors user activity.
- 13. Overwhelms a server with traffic.
- 15. Self-replicating malware spreading across networks.
