Form 4 Crossword

12345678910
Across
  1. 3. The deliberate act of using digital platforms to intimidate, harass, or harm someone through electronic communication
  2. 6. Stealthy malware designed to hide its presence while maintaining unauthorized access to a computer
  3. 7. Self-replicating malware that spreads independently across networks without needing a host file or user interaction
  4. 8. A network of compromised computers controlled remotely by cybercriminals to launch coordinated attacks
  5. 9. Malware that secretly monitors and records user activities, such as keystrokes, to capture sensitive data
  6. 10. Voice phishing that uses phone calls to impersonate a trusted entity to trick victims
Down
  1. 1. A type of malware that encrypts a victim's files and demands a payment to restore access
  2. 2. Creating a false scenario or pretending to be someone else, such as a bank representative, to manipulate a victim
  3. 4. Luring victims by offering something enticing, like a free download, which often results in malware installation
  4. 5. A type of malware that replicates by attaching itself to legitimate files or programs