Malware & Social Engineering
Across
- 2. locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- 6. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
- 10. malicious software
- 12. attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.
- 13. an attack designed to steal a victims password or other sensitive data. it involves the attacker watching while the victims provides sensitive information
Down
- 1. a large collection of malware connected devices
- 3. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data
- 4. replicate themselves but do not attach themselves to files
- 5. unwanted software that monitors and gathers information on a person and how they use their computer.
- 7. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- 8. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- 9. a malicious form of self-replicating software.
- 11. automated programs that perform tasks repeatedly.