Cyber threats

1234567891011121314
Across
  1. 2. Malware designed to provide hidden administrative access
  2. 7. Malware that locks files and demands payment
  3. 9. Software that secretly records keystrokes
  4. 10. Attack that overwhelms a server with traffic
  5. 11. Hidden method of bypassing authentication
  6. 13. Software that displays unwanted advertisements
  7. 14. Network of infected computers controlled remotely
Down
  1. 1. Self-replicating malware that spreads without user action
  2. 3. Malware that secretly monitors user activity
  3. 4. Malware disguised as legitimate software
  4. 5. Code that takes advantage of a system vulnerability
  5. 6. Malware that attaches itself to a legitimate file
  6. 8. Malicious software designed to damage or disrupt systems
  7. 12. Fraudulent attempt to steal sensitive information via email