Cyber threats
Across
- 2. Malware designed to provide hidden administrative access
- 7. Malware that locks files and demands payment
- 9. Software that secretly records keystrokes
- 10. Attack that overwhelms a server with traffic
- 11. Hidden method of bypassing authentication
- 13. Software that displays unwanted advertisements
- 14. Network of infected computers controlled remotely
Down
- 1. Self-replicating malware that spreads without user action
- 3. Malware that secretly monitors user activity
- 4. Malware disguised as legitimate software
- 5. Code that takes advantage of a system vulnerability
- 6. Malware that attaches itself to a legitimate file
- 8. Malicious software designed to damage or disrupt systems
- 12. Fraudulent attempt to steal sensitive information via email