Types of Malware

12345678910111213141516171819
Across
  1. 3. Type of malware that can Infect you with other malware, disable your malware protection, initiate a DDoS attack, and take over your device,
  2. 6. any malicious software written specifically to infect and harm the host system or its user
  3. 7. to protect yourself make sure your run an _______________ program and its databases are up to date.
  4. 8. Type of attack that uses convincing emails to trick people into giving up information or downloading attachments that they otherwise wouldn’t
  5. 10. Type of attack that aims to gain your trust in order to get you to give up personal information
  6. 13. Type of malware that causes unwanted popups and is usually unknowingly downloaded with legitimate software.
  7. 16. Type of malware that will lock or encrypt your files until the attacker is paid.
  8. 18. Also known as sandboxing, _____________________ makes a virtual version of your computer that can safely open suspicious files.
  9. 19. To protect yourself from viruses don’t download or open _________________ in emails from untrusted sources.
Down
  1. 1. Pretending to be someone else who is legitimately on the network and trusted.
  2. 2. Type of malware that logs your actions, search history and keystrokes in order to gain your information
  3. 4. Type of malware that seems to be legitimate software that will either steal your information or allow a backdoor for hackers to get into your system
  4. 5. The process of intercepting packets traveling across a network.
  5. 9. self-replicating programs that make copies of themselves by attaching to other programs
  6. 11. Occurs when an employee or someone with access to critical assets of an organization carries out an attack.
  7. 12. Dealing with information that has been stolen/given up can be difficult, it is best to _____________ these problems before it happens.
  8. 14. goal of viruses is to ________ other programs and spread
  9. 15. Type of malware that is similar to a virus but can self replicate without any human interaction and spread across networks
  10. 17. viruses typically require a user to __________ a file for it to take effect