Cyber Attakcs Quiz
Across
- 3. A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
- 5. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 7. A type of malware disguised as legitimate software, used to hack into the user's system.
- 8. Software that automatically displays or downloads advertising material when a user is online.
- 10. Malicious software designed to secretly monitor and collect information from a computer.
Down
- 1. A type of surveillance software that records keystrokes to capture sensitive information like passwords.
- 2. A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
- 4. A type of malware that encrypts the victim's files, demanding payment for the decryption key.
- 6. A type of malicious code that replicates itself and spreads from one computer to another.
- 9. A type of malware that replicates itself to spread to other computers without any user intervention.