j808 4.1 types of threats

123456789101112131415
Across
  1. 2. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. 3. any software that shows adverts
  3. 7. Software that encrypts programs and data until a ransom is paid to remove it.
  4. 8. When someone deceives by pretending to be someone else in order to get personal data.
  5. 10. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  6. 13. Criminals make a promise of goods in return for details, such as offering a free music download.
  7. 15. Program that hides in a computer and allows someone from a remote location to take full control of the computer
Down
  1. 1. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  2. 4. A type of Malware that locates and saves data from users without them knowing about it
  3. 5. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. 6. Collection of captured bot computers
  5. 9. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  6. 11. malware that allows a cyber-security attacker to take control of an infected computer
  7. 12. An error in a program that prevents the program from running as expected.
  8. 14. horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer