Types of threats

12345678910111213
Across
  1. 5. Any software that shows adverts, such as popups.
  2. 7. Watching an authorized user enter a security code on a keypad.
  3. 9. An error in a program that prevents the program from running as expected.
  4. 10. Software that encrypts programs and data until a ransom is paid to remove it.
  5. 11. Malware that allows a cyber-security attacker to take control of an infected computer.
  6. 12. Criminals make a promise of goods in return for details, such as offering a free music download.
  7. 13. Horse A program that appears desirable but actually contains something harmful.
Down
  1. 1. A type of Malware that locates and saves data from users without them knowing about it.
  2. 2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise
  3. 3. A piece of code that is capable of copying itself and typically has a detrimental effect
  4. 4. An attacker entering a secured building by following an authorized employee through a secure door
  5. 6. When someone deceives by pretending to be someone else in order to get personal data.
  6. 8. A destructive computer program that bores its way through a computer's files or through a computer's network.
  7. 10. Program that hides in a computer and allows someone from a remote location to take full control
  8. 12. Malware that allows a cyber-security attacker to take control of an infected computer.