Malware and Social Engineering Key-Terms
Across
- 2. An attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- 3. The month where the WannaCry attack took place.
- 6. malicious form of self replicating software.
- 12. a software that is designed to gain access to your device with malicious intent.
- 13. A botnet is a large collection of malware-infected devices (zombies).
- 14. an unwanted software that monitors and gathers information on a person and how they use their computer.
- 15. A form of spyware that records every keystroke made by the user.
Down
- 1. A ransomware attack that affected over 200,000 computers.
- 4. infects a computer and downloads or displays malicious adverts/pop-ups when the victim is online.
- 5. An attacker chooses when to wake the zombies to perform an attack.
- 7. An attack designed to steal a victim's password or other sensitive data.
- 8. use up network bandwidth and slow down the network.
- 9. a software that appears to be useful but performs malicious actions.
- 10. demands that a ransom be paid before they decrypt the files and unlock the computer.
- 11. Something that can happen to your files when you're affected by malware.