A spot-the-threat challenge with 8 hidden cybersecurity risks
Across
- 1. Software that secretly gathers information about a person or organization without their knowledge.
- 3. A cyberattack where a person or program disitself guises as another by falsifying data to gain an advantage.
- 6. A type of malware disguised as legitimate software that tricks users into installing it.
- 7. Malicious software designed to harm, exploit, or disable computers and networks.
- 8. Synthetic media in which a person in an image or video is replaced with someone else's likeness using AI.
Down
- 2. A type of cyberattack where attackers pretend to be a trustworthy entity to steal sensitive information.
- 4. A type of malware that locks or encrypts data and demands payment for its release.
- 5. A network of private computers infected with malicious software and controlled as a group.