Across
- 2. programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
- 5. occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
- 7. a program which is often disguised as legitimate software but with malicious instructions embedded within it.
- 10. is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge
- 11. the act of gaining illegal access to a computer system without the user’s permission.
- 13. spam traffic originates from many different computers, which makes it hard to block the attack.
Down
- 1. a malware which will attempt to flood an end-user with unwanted advertising.
- 3. when a cybercriminal creates a social situation that can lead to a potential victim dropping their protection. It involves the manipulation of people into breaking their normal security procedures and not following best practice.
- 4. is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent this malware.
- 6. a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks
- 8. are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits until the ransom money is paid and, sometimes, the decryption key is then sent to the user.
- 9. an attack that attempts at preventing users from accessing part of a network, notably an internet server.
- 12. form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
- 14. an attack to 'crack’ password by systematically trying all thedifferent combinations of letters, numbers and other symbols until eventuallythe password is found.
