Malicious Software

1234567891011121314151617181920212223242526
Across
  1. 2. software that contains advertisements
  2. 6. software desguised as legitimate but contains another bit of software that is installed without your concent.
  3. 7. when online users deliberately causes trouble with other online users
  4. 8. computer that was compromised by malware
  5. 10. online harassment, ridiculing or threatening messages
  6. 12. attempting to gather someone's personal details through the use of convincing messages persuading them to reveal this information
  7. 16. acquiring someone's personal information such as usernames and passwords
  8. 19. an application that tracks the keystrokes of computer
  9. 20. registering a domain name without the intend to actually use it.
  10. 22. self-replicating malicious software found on networks
  11. 23. divulging of personal or confidential information, looks like the email is from a legitimate company
  12. 25. unwanted program installed with a downloaded application
  13. 26. using software without purchasing it.
Down
  1. 1. process whereby access to a computer system is gained by circumventing security restriction on the system.
  2. 3. tricking users into visiting a fake site that looks like a legitimate site
  3. 4. tactic used to get someon to reveal confidentail information unwittingly through a series of question or manipulation
  4. 5. decoy computer that attract hackers to analyze how they hack networks
  5. 9. posting offensive content online on social networking groups
  6. 11. a network of compromised computers
  7. 13. spreading of untrue information via emails and social media platforms
  8. 14. disinformation published online
  9. 15. when a number of infected computers bombared a website to make it crash
  10. 17. manipulating videos and images through the use of AI to seem legitimate
  11. 18. masking IP addressess to appear as legitimate websites
  12. 20. impersonating someone else online
  13. 21. type of phising related to people in important positions
  14. 23. unsolicited bulk email messages
  15. 24. software installed without users knowledge to monitor users actions on the computer.