1.4.1 Security Threats

1234567
Across
  1. 2. An amalgamation of the words malicious software.
  2. 5. Where a criminal encrypts a computer system and asks the owner to pay for it to be decrypted.
  3. 7. _______ engineering exploits people into revealing personal details or passwords.
Down
  1. 1. A virus that pretends to be legitimate software but isn't.
  2. 3. The weakest part of a computer system.
  3. 4. Malware is also known as this.
  4. 6. A virus that replicates itself and uses up processing time.