Malware

1234567891011121314
Across
  1. 2. A cyber attack intended to redirect a website's traffic to another, fraudulent site.
  2. 10. Attempts to crack passwords or keys through trial and error, not by exploiting any inherent weakness in the encryption but by sheer volume of attempts.
  3. 11. The placement of malicious code in SQL statements, via web page input, to manipulate a database behind the website.
  4. 12. The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
  5. 13. Insufficient rules and guidelines that govern the use and security of a network, which can lead to vulnerabilities.
  6. 14. The act of capturing and reading packets as they cross a network or part of a network. If the packets are not encrypted, their content can be read.
Down
  1. 1. Any software package which automatically renders advertisements to generate revenue for its author.
  2. 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. 4. A form of malware designed to trick victims into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
  4. 5. Malicious software that replicates itself by modifying other computer programs and inserting its own code.
  5. 6. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  6. 7. Malware that locks or encrypts the victim's data until a ransom is paid.
  7. 8. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. 9. An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.