Cyber Attakcs Quiz

12345678910
Across
  1. 3. A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
  2. 5. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. 7. A type of malware disguised as legitimate software, used to hack into the user's system.
  4. 8. Software that automatically displays or downloads advertising material when a user is online.
  5. 10. Malicious software designed to secretly monitor and collect information from a computer.
Down
  1. 1. A type of surveillance software that records keystrokes to capture sensitive information like passwords.
  2. 2. A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
  3. 4. A type of malware that encrypts the victim's files, demanding payment for the decryption key.
  4. 6. A type of malicious code that replicates itself and spreads from one computer to another.
  5. 9. A type of malware that replicates itself to spread to other computers without any user intervention.