Across
- 1. A type of security software used to detect and remove traditional computer viruses.
- 3. An attack where an individual steals valuable equipment or data or physically harms another individual.
- 4. Software that displays or downloads advertising material like pop-up ads.
- 5. A form of malware where malicious code is installed on a computer and the legitimate user is locked out of their sensitive data.
- 7. Malware that replicates and spreads itself across devices within a network.
- 9. A type of spyware where a hacker captures keyboard keystrokes, including the keystrokes used to sign in to accounts.
- 10. A type of malicious attack where individuals are tricked into providing confidential info.
- 12. A social engineering attack where individuals make phone calls or leave voice messages to try and trick companies or individuals into revealing personal information.
- 13. A type of malicious software designed to allow an individual to collect information about another user's computer activities.
Down
- 1. A type of security software used to detect, remove, and prevent malware attacks on a computer. Antimalware is used to detect advanced forms of malware.
- 2. a type of cyberattack where scammers use fraudulent messages, often disguised as legitimate communications, to trick people into revealing sensitive information like passwords, credit card numbers, or personal data.
- 6. Malicious software, including viruses, ransomware, and spyware.
- 8. A type of malware that is not self-replicating. It presents a program that appears to be legitimate and harmless to trick users into clicking and launching the trojan horse.
- 11. A program or malicious code that runs on a computer without the user's knowledge. A computer virus copies itself to other devices with the purpose of damaging the device and/or stealing data.
