Malware and Social Engineering Key-Terms

123456789101112131415
Across
  1. 2. An attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  2. 3. The month where the WannaCry attack took place.
  3. 6. malicious form of self replicating software.
  4. 12. a software that is designed to gain access to your device with malicious intent.
  5. 13. A botnet is a large collection of malware-infected devices (zombies).
  6. 14. an unwanted software that monitors and gathers information on a person and how they use their computer.
  7. 15. A form of spyware that records every keystroke made by the user.
Down
  1. 1. A ransomware attack that affected over 200,000 computers.
  2. 4. infects a computer and downloads or displays malicious adverts/pop-ups when the victim is online.
  3. 5. An attacker chooses when to wake the zombies to perform an attack.
  4. 7. An attack designed to steal a victim's password or other sensitive data.
  5. 8. use up network bandwidth and slow down the network.
  6. 9. a software that appears to be useful but performs malicious actions.
  7. 10. demands that a ransom be paid before they decrypt the files and unlock the computer.
  8. 11. Something that can happen to your files when you're affected by malware.