Types of Malware
Across
- 3. Type of malware that can Infect you with other malware, disable your malware protection, initiate a DDoS attack, and take over your device,
- 6. any malicious software written specifically to infect and harm the host system or its user
- 7. to protect yourself make sure your run an _______________ program and its databases are up to date.
- 8. Type of attack that uses convincing emails to trick people into giving up information or downloading attachments that they otherwise wouldn’t
- 10. Type of attack that aims to gain your trust in order to get you to give up personal information
- 13. Type of malware that causes unwanted popups and is usually unknowingly downloaded with legitimate software.
- 16. Type of malware that will lock or encrypt your files until the attacker is paid.
- 18. Also known as sandboxing, _____________________ makes a virtual version of your computer that can safely open suspicious files.
- 19. To protect yourself from viruses don’t download or open _________________ in emails from untrusted sources.
Down
- 1. Pretending to be someone else who is legitimately on the network and trusted.
- 2. Type of malware that logs your actions, search history and keystrokes in order to gain your information
- 4. Type of malware that seems to be legitimate software that will either steal your information or allow a backdoor for hackers to get into your system
- 5. The process of intercepting packets traveling across a network.
- 9. self-replicating programs that make copies of themselves by attaching to other programs
- 11. Occurs when an employee or someone with access to critical assets of an organization carries out an attack.
- 12. Dealing with information that has been stolen/given up can be difficult, it is best to _____________ these problems before it happens.
- 14. goal of viruses is to ________ other programs and spread
- 15. Type of malware that is similar to a virus but can self replicate without any human interaction and spread across networks
- 17. viruses typically require a user to __________ a file for it to take effect