Malware

1234567891011121314151617181920
Across
  1. 2. program or code introduced by a criminal who has compromised a system.
  2. 3. phishing using voice communication technology.
  3. 6. This type of malware remains inactive until that trigger event happens.
  4. 7. junk mail
  5. 10. malicious executable code attached to another executable file, such as a legitimate program.
  6. 11. modifies the operating system to create a backdoor.
  7. 14. software that enables a criminal to obtain information about a user’s computer activities.
  8. 15. takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
  9. 18. Short Message Service phishing
  10. 19. malicious software
  11. 20. a phishing attack that targets high profile targets within an organization such as senior executives.
Down
  1. 1. malware that carries out malicious operations under the guise of a desired operation such as playing an online game.
  2. 4. non-technical means for a criminal to gather information on a target.
  3. 5. malicious code that replicates by independently exploiting vulnerabilities in networks.
  4. 8. the impersonation of a legitimate website in an effort to deceive users into entering their credentials.
  5. 9. an attacker requests personal information from a party in exchange for something, like a gift.
  6. 12. a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
  7. 13. holds a computer system, or the data it contains, captive until the target makes a payment.
  8. 16. a highly targeted phishing attack.
  9. 17. displays annoying pop-ups to generate revenue for its authors.