Across
- 1. A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
- 3. A program that remains dormant until triggered by a specific event to execute its harmful actions.
- 5. Software design to disrupt, damage, or gain unauthorized access to computer systems.
- 7. Malware that encrypts a victim's data and demands payment to restore access.
- 9. Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
- 2. Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
- 4. A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
- 6. An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
- 8. Malicious software that replicates itself and spreads independently in networks, without needing a host program.