Cybersecurity Fundamentals - Chapter 3
Across
- 1. to make malicious website appear higher in search engine result.
- 2. software that enables a criminal to obtain information about user's computer activities.
- 3. an attack that targes high profile targets within an organization.
- 6. impersonation of a legitimate website
- 8. the program or code introduced by a criminal who has compromised a system
- 10. malicious program that uses a trigger to awaken the malicious code
- 11. malicious code that replicates by independently exploiting vulnerabilities.
- 12. malware that carries out malicious operation under the guise of a desired operation.
- 15. a malicious executable code attached to another executable file.
- 16. known as junk mail
Down
- 1. highly targeted phishing attack, that send customized emails to a specific person or individual.
- 4. holds a computer system, or the data it contains, captive until the target makes a payment.
- 5. alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
- 7. a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
- 9. persuades the user to take specific action based on fear
- 13. displays annoying pop-ups to generate revenue for its authors.
- 14. using voice communication technology and records message that appears legitimate.