Across
- 4. Obtaining sensitive information by pretending to be a trustworthy entity in communications.
- 5. Bypasses normal authentication to gain unauthorized access, installed by malware or developers.
- 6. Self-replicating malware spreading across networks, consuming bandwidth, overloading servers, and stealing data.
- 7. Fraudulent schemes designed to deceive individuals into providing personal information or money.
- 11. Hides itself and its activities, granting unauthorized access/control, tracking keystrokes, and intercepting data.
- 12. Displays/downloads advertising material online, slowing devices, hijacking browsers, and installing other malware.
- 13. Physical damage caused by fire, destroying systems and data.
Down
- 1. Malware that attaches to programs/files, spreads when run, causing data destruction, system slowdown, and keystroke logging.
- 2. Redirecting website traffic to fraudulent sites to steal information.
- 3. Blocks access to systems/data until a ransom is paid, can lock computers or encrypt data.
- 8. Secretly monitors and collects user activity information, tracking keystrokes and capturing screenshots.
- 9. Malware disguised as legitimate software, often used to gain remote access or steal data.
- 10. Networks of infected computers controlled by a central server, used for DDoS attacks, spam, or cryptocurrency mining.
