Across
- 2. malware that employs encryption to hold a victim's information at ransom.
- 5. weaknesses in a system that gives threats the opportunity to compromise assets.
- 6. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- 8. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- 1. the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- 3. intrusive software that is designed to damage and destroy computers and computer systems
- 4. threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- 7. type of malicious code or software that looks legitimate but can take control of your computer.