Cybersecurity

123456789
Across
  1. 5. A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
  2. 8. A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
  3. 9. A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
  1. 1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
  2. 2. A standalone malware computer program that replicates itself in order to spread to other computers.
  3. 3. A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
  4. 4. A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
  5. 6. Malware that involves advertising.
  6. 7. A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.