Cybersecurity Threats

1234567891011121314
Across
  1. 1. A type of malicious software that can replicate itself and spread to other systems.
  2. 2. Unwanted or unsolicited emails, often used to deliver malware or phishing attempts.
  3. 7. Malicious software that encrypts files and demands a ransom to restore access.
  4. 9. Malicious software that secretly monitors and collects information about a user.
  5. 10. Malicious ads that spread malware through advertising networks.
  6. 11. Any potential danger to an organization's data, networks, or systems.
  7. 13. Redirecting users to a fraudulent website without their knowledge.
  8. 14. Tricking a user into clicking something different from what they think they’re clicking on.
Down
  1. 1. A weakness in a system that can be exploited by attackers.
  2. 3. A scam where attackers send fraudulent emails to trick recipients into providing sensitive information.
  3. 4. Unwanted software that displays ads, often bundled with free downloads.
  4. 5. Listening in on communications without permission, often used in attacks.
  5. 6. Software that records the keys pressed on a keyboard to steal sensitive information, such as passwords.
  6. 8. A type of malware that replicates itself to spread to other computers over a network.
  7. 10. Malicious software designed to damage or gain unauthorized access to systems.
  8. 12. Taking advantage of a vulnerability in a system or network to gain unauthorized access.