Cybersecurity Threats

1234567891011121314
Across
  1. 2. programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
  2. 5. occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
  3. 7. a program which is often disguised as legitimate software but with malicious instructions embedded within it.
  4. 10. is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge
  5. 11. the act of gaining illegal access to a computer system without the user’s permission.
  6. 13. spam traffic originates from many different computers, which makes it hard to block the attack.
Down
  1. 1. a malware which will attempt to flood an end-user with unwanted advertising.
  2. 3. when a cybercriminal creates a social situation that can lead to a potential victim dropping their protection. It involves the manipulation of people into breaking their normal security procedures and not following best practice.
  3. 4. is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent this malware.
  4. 6. a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks
  5. 8. are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits until the ransom money is paid and, sometimes, the decryption key is then sent to the user.
  6. 9. an attack that attempts at preventing users from accessing part of a network, notably an internet server.
  7. 12. form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
  8. 14. an attack to 'crack’ password by systematically trying all thedifferent combinations of letters, numbers and other symbols until eventuallythe password is found.