External Threats

12345678910111213
Across
  1. 4. Obtaining sensitive information by pretending to be a trustworthy entity in communications.
  2. 5. Bypasses normal authentication to gain unauthorized access, installed by malware or developers.
  3. 6. Self-replicating malware spreading across networks, consuming bandwidth, overloading servers, and stealing data.
  4. 7. Fraudulent schemes designed to deceive individuals into providing personal information or money.
  5. 11. Hides itself and its activities, granting unauthorized access/control, tracking keystrokes, and intercepting data.
  6. 12. Displays/downloads advertising material online, slowing devices, hijacking browsers, and installing other malware.
  7. 13. Physical damage caused by fire, destroying systems and data.
Down
  1. 1. Malware that attaches to programs/files, spreads when run, causing data destruction, system slowdown, and keystroke logging.
  2. 2. Redirecting website traffic to fraudulent sites to steal information.
  3. 3. Blocks access to systems/data until a ransom is paid, can lock computers or encrypt data.
  4. 8. Secretly monitors and collects user activity information, tracking keystrokes and capturing screenshots.
  5. 9. Malware disguised as legitimate software, often used to gain remote access or steal data.
  6. 10. Networks of infected computers controlled by a central server, used for DDoS attacks, spam, or cryptocurrency mining.