Cybersecurity Threats
Across
- 1. A type of malicious software that can replicate itself and spread to other systems.
- 2. Unwanted or unsolicited emails, often used to deliver malware or phishing attempts.
- 7. Malicious software that encrypts files and demands a ransom to restore access.
- 9. Malicious software that secretly monitors and collects information about a user.
- 10. Malicious ads that spread malware through advertising networks.
- 11. Any potential danger to an organization's data, networks, or systems.
- 13. Redirecting users to a fraudulent website without their knowledge.
- 14. Tricking a user into clicking something different from what they think they’re clicking on.
Down
- 1. A weakness in a system that can be exploited by attackers.
- 3. A scam where attackers send fraudulent emails to trick recipients into providing sensitive information.
- 4. Unwanted software that displays ads, often bundled with free downloads.
- 5. Listening in on communications without permission, often used in attacks.
- 6. Software that records the keys pressed on a keyboard to steal sensitive information, such as passwords.
- 8. A type of malware that replicates itself to spread to other computers over a network.
- 10. Malicious software designed to damage or gain unauthorized access to systems.
- 12. Taking advantage of a vulnerability in a system or network to gain unauthorized access.