Types of External Threat
Across
- 2. Self-replicating malware that spread across networks by exploiting vulnerabilities, often without user interaction.
- 4. Encrypts files on a victim's system, demanding a ransom payment to restore access. It may also threaten to leak data.
- 5. Secretly monitors and collects user data, such as keystrokes, browsing habits, and personal information, without the user’s consent.
Down
- 1. Disguise themselves as legitimate software but carry malicious payloads that can perform various harmful actions once installed.
- 3. Hide their presence and other malicious software on a system, providing unauthorised access and control to attackers.
- 6. Displays unwanted advertisements on a user's device, often through pop-ups or banners. It can track browsing habits to target ads.