4.1 Types of Threats

1234567891011121314
Across
  1. 4. Software that encrypts a computers programs and data until a ransom is paid.
  2. 11. When criminals offer a service in exchange for details.
  3. 12. Watching a user enter a password or security code.
  4. 13. When a user pretends to be another user in order to steal another user's personal data.
  5. 14. When criminals offer free goods or services in return for details,such as offering a free membership.
Down
  1. 1. Advertising supported software. Any software that shows adverts, including popups. Sometimes it can be harmless or it can include spyware.
  2. 2. A virus that bores its way through a computer;s files or a network.
  3. 3. A virus that appears to be a program that actually is harmful and allows information to be stolen.
  4. 5. An online scam that targets the user's address bar, so that when they believe they are entering a valid website, it is actually illegitimate and steals the user's information.
  5. 6. Gaining entry to a secured building by following another person through the door once it opens.
  6. 7. A program that hides in a computer and allows someone from a remote location to control the computer.
  7. 8. An attempt at getting a user to input their details so they can be stolen.
  8. 9. A piece of code that is capable of copying itself, that typically is harmful to a user and their computer
  9. 10. A collection of captured bot computers
  10. 14. An error in a program that prevents the program from running as it is expected to.