Cyber Threats
Across
- 1. Targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises
- 4. Can execute itself and spread by infecting other programs or files.
- 8. Use a false promise to pique a victim
- 10. Uses trial and error to crack passwords
- 11. malicious software designed to harm or exploit computer systems.
- 12. Collects information and data on the device and user
- 13. Victims are bombarded with false alarms and fictitious threats
Down
- 2. trick individuals into sharing sensitive information
- 3. Appears as a legitimate software program to gain access to a system.
- 5. Uses psychological manipulation to trick users into making security mistakes.
- 6. Encrypts files on a victim's computer and demands a ransom payment in exchange for the decryption key.
- 7. Tracks a user's browser and download history with the intent to display pop-up
- 9. self-replicate without a host program and typically spreads without any interaction from the malware authors.