Cyber Threats

12345678910111213
Across
  1. 1. Targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises
  2. 4. Can execute itself and spread by infecting other programs or files.
  3. 8. Use a false promise to pique a victim
  4. 10. Uses trial and error to crack passwords
  5. 11. malicious software designed to harm or exploit computer systems.
  6. 12. Collects information and data on the device and user
  7. 13. Victims are bombarded with false alarms and fictitious threats
Down
  1. 2. trick individuals into sharing sensitive information
  2. 3. Appears as a legitimate software program to gain access to a system.
  3. 5. Uses psychological manipulation to trick users into making security mistakes.
  4. 6. Encrypts files on a victim's computer and demands a ransom payment in exchange for the decryption key.
  5. 7. Tracks a user's browser and download history with the intent to display pop-up
  6. 9. self-replicate without a host program and typically spreads without any interaction from the malware authors.