Security Threats

12345678910111213
Across
  1. 2. Takes advantage of a vulnerability in order to access or infect a computer
  2. 5. software that permits advertisers or hackers to gather sensitive information without your permission
  3. 6. a form of malware that replicates across the Internet or local networks
  4. 10. software that denies you access to your files or computer until you pay a ransom
  5. 11. a form of trap security specialists use to detect hacking attacks or collect malware samples
  6. 13. malicious computer programs that can spread to other files
Down
  1. 1. A collection of infected computers that are remotely controlled by a hacker
  2. 3. malicious software
  3. 4. unsolicited bulk email
  4. 7. Files placed on your computer that allow websites to remember details
  5. 8. reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
  6. 9. software add-ons designed to fix software bugs
  7. 12. deceiving recipients into sharing sensitive