Malware
Across
- 2. program or code introduced by a criminal who has compromised a system.
- 3. phishing using voice communication technology.
- 6. This type of malware remains inactive until that trigger event happens.
- 7. junk mail
- 10. malicious executable code attached to another executable file, such as a legitimate program.
- 11. modifies the operating system to create a backdoor.
- 14. software that enables a criminal to obtain information about a user’s computer activities.
- 15. takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
- 18. Short Message Service phishing
- 19. malicious software
- 20. a phishing attack that targets high profile targets within an organization such as senior executives.
Down
- 1. malware that carries out malicious operations under the guise of a desired operation such as playing an online game.
- 4. non-technical means for a criminal to gather information on a target.
- 5. malicious code that replicates by independently exploiting vulnerabilities in networks.
- 8. the impersonation of a legitimate website in an effort to deceive users into entering their credentials.
- 9. an attacker requests personal information from a party in exchange for something, like a gift.
- 12. a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
- 13. holds a computer system, or the data it contains, captive until the target makes a payment.
- 16. a highly targeted phishing attack.
- 17. displays annoying pop-ups to generate revenue for its authors.