Cyber Crossword
Across
- 5. a form of malware which locks a user out of their own system and cuts access to their files usually with instructions for payment.
- 7. a stealthy threat actor which gains unauthorised access to a network and remains undetected for an extended period of time.
- 9. software that runs automated tasks over the internet.
- 10. runs a background process to generate profit for the attacker, unbeknownst to the user.
- 11. a cyber-attack in which the perpetrator uses multiple systems to make a machine or network resource unavailable to its users by disrupting the services of a host connected to the internet.
Down
- 1. the part of malware that performs malicious actions.
- 2. a trial and error method to decrypt data.
- 3. a technique which tricks users into revealing sensitive information to seemingly benign sources.
- 4. a destructive self-contained program which can self-replicate.
- 5. a malware program that can be installed on a system which can provide unhindered access to remote applications.
- 6. a threat that is not known to the public and hence hidden from signature-based detection controls.
- 8. a software program designed to hijack a computer system or steal sensitive information from a device.