Across
- 2. A type of malware that locates and saves data from users without them knowing about it
- 4. Collection of captured bot computers
- 7. An error in the program that prevents it from running as expected
- 8. Software that encrypts programs and data until a ransom is paid to remove it
- 9. Software that shows adverts such as popups
- 10. A program that appears desirable but actually contains something harmful. they can copy themselves, steal information, or harm the host computer
- 12. Program that hides in a computer and allows someone from a remote location to take full control of the computer
- 13. An attack that sends an email or displays a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into sharing private information
Down
- 1. Criminals make a promise of goods in return for details, such as offering a free music download
- 2. Watching an authorized user enter a security code on a keypad
- 3. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 5. A destructive computer program that bores its way through a computers files or through a computers network
- 6. When someone deceives by pretending to be someone else in order to get personal data
- 11. Malware that allows a cyber-security attacker to take control of an infected computer
- 14. Unauthorized access, modification, or use of an electronic device or some element of a computer system
