Malware

123456789101112
Across
  1. 2. Automated programs that perform tasks repeatedly.
  2. 8. A worm, virus, or Trojan. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  3. 10. Methods used by cybercriminals to deceive individuals into handing over sensitive information.
  4. 11. Spread through the network and use the system’s resources.
  5. 12. Unwanted software that monitors and gathers information on a person and how they use their computer.
Down
  1. 1. A type of virus that disguises itself as something else, like a game but actually causes harm.
  2. 3. When the attacker watches a victim when they are providing sensitive information.
  3. 4. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
  4. 5. Are a malicious form of self-replicating software.
  5. 6. A large collection of malware-infected devices (zombies). This type of attack is called DDoS.
  6. 7. An attack where the victim receives an email disguised to look like it has come from a reputable source and tricks them into giving up valuable data.
  7. 9. This locks computers and encrypts data, and demands a ransom to unlock the files.