J808 4.1 Types of Threats

1234567891011121314
Across
  1. 2. Type of malware that locates and saves data from users without them knowing about it
  2. 5. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. 7. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. 8. Encrypts programs and data until ransome is paid
  5. 10. Error in a program that prevents the program from running as expected
  6. 11. Collection of captured bot computers
  7. 13. Piece of code that is capable of copying itself and typically has a detrimental effect such as corruptin the system or destroying data
  8. 14. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
Down
  1. 1. A program that appears desirable but acctualy contains something harmful they can copy themselves steal info or harm the host computer
  2. 3. Criminals promise a service in exchange for details - a common example is offering help with IT problems
  3. 4. Software that shows adverts It can be harmless
  4. 6. When someone deceives by pretending to be someone else in order to get personal data.
  5. 9. Program that hides in a computer and allows someone from a remote location to take control
  6. 10. Malware that allows cyber security attacker to take control of computer
  7. 12. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information