Across
- 2. Software used to prevent, scan, detect and delete viruses from a computer.
- 5. A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
- 7. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- 9. A type of malware designed to give hackers access to and control over a target device.
- 10. A cyber-attack that targets individuals through SMS or text messages.
- 11. Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
- 1. A type of malware that disguises itself as legitimate code or software.
- 3. Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
- 4. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- 6. A technique through which a cybercriminal disguises themselves as a known or trusted source.
- 8. A network of compromised computers used to carry out cyberattacks on other systems.