Cybersecurity Fundamentals - Chapter 3

12345678910111213141516
Across
  1. 1. to make malicious website appear higher in search engine result.
  2. 2. software that enables a criminal to obtain information about user's computer activities.
  3. 3. an attack that targes high profile targets within an organization.
  4. 6. impersonation of a legitimate website
  5. 8. the program or code introduced by a criminal who has compromised a system
  6. 10. malicious program that uses a trigger to awaken the malicious code
  7. 11. malicious code that replicates by independently exploiting vulnerabilities.
  8. 12. malware that carries out malicious operation under the guise of a desired operation.
  9. 15. a malicious executable code attached to another executable file.
  10. 16. known as junk mail
Down
  1. 1. highly targeted phishing attack, that send customized emails to a specific person or individual.
  2. 4. holds a computer system, or the data it contains, captive until the target makes a payment.
  3. 5. alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
  4. 7. a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
  5. 9. persuades the user to take specific action based on fear
  6. 13. displays annoying pop-ups to generate revenue for its authors.
  7. 14. using voice communication technology and records message that appears legitimate.