Types of External Threat

123456
Across
  1. 2. Self-replicating malware that spread across networks by exploiting vulnerabilities, often without user interaction.
  2. 4. Encrypts files on a victim's system, demanding a ransom payment to restore access. It may also threaten to leak data.
  3. 5. Secretly monitors and collects user data, such as keystrokes, browsing habits, and personal information, without the user’s consent.
Down
  1. 1. Disguise themselves as legitimate software but carry malicious payloads that can perform various harmful actions once installed.
  2. 3. Hide their presence and other malicious software on a system, providing unauthorised access and control to attackers.
  3. 6. Displays unwanted advertisements on a user's device, often through pop-ups or banners. It can track browsing habits to target ads.