Cybersecurity Fundamentals Chapter 3

123456789
Across
  1. 1. A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
  2. 3. A program that remains dormant until triggered by a specific event to execute its harmful actions.
  3. 5. Software design to disrupt, damage, or gain unauthorized access to computer systems.
  4. 7. Malware that encrypts a victim's data and demands payment to restore access.
  5. 9. Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
  1. 2. Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
  2. 4. A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
  3. 6. An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
  4. 8. Malicious software that replicates itself and spreads independently in networks, without needing a host program.