4.1 Types of Threats

1234567891011121314
Across
  1. 2. A type of malware that locates and saves data from users without them knowing about it
  2. 4. Collection of captured bot computers
  3. 7. An error in the program that prevents it from running as expected
  4. 8. Software that encrypts programs and data until a ransom is paid to remove it
  5. 9. Software that shows adverts such as popups
  6. 10. A program that appears desirable but actually contains something harmful. they can copy themselves, steal information, or harm the host computer
  7. 12. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  8. 13. An attack that sends an email or displays a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into sharing private information
Down
  1. 1. Criminals make a promise of goods in return for details, such as offering a free music download
  2. 2. Watching an authorized user enter a security code on a keypad
  3. 3. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  4. 5. A destructive computer program that bores its way through a computers files or through a computers network
  5. 6. When someone deceives by pretending to be someone else in order to get personal data
  6. 11. Malware that allows a cyber-security attacker to take control of an infected computer
  7. 14. Unauthorized access, modification, or use of an electronic device or some element of a computer system