Across
- 2. Type of malware that locates and saves data from users without them knowing about it
- 5. Criminals make a promise of goods in return for details, such as offering a free music download.
- 7. A destructive computer program that bores its way through a computer's files or through a computer's network.
- 8. Encrypts programs and data until ransome is paid
- 10. Error in a program that prevents the program from running as expected
- 11. Collection of captured bot computers
- 13. Piece of code that is capable of copying itself and typically has a detrimental effect such as corruptin the system or destroying data
- 14. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
Down
- 1. A program that appears desirable but acctualy contains something harmful they can copy themselves steal info or harm the host computer
- 3. Criminals promise a service in exchange for details - a common example is offering help with IT problems
- 4. Software that shows adverts It can be harmless
- 6. When someone deceives by pretending to be someone else in order to get personal data.
- 9. Program that hides in a computer and allows someone from a remote location to take control
- 10. Malware that allows cyber security attacker to take control of computer
- 12. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
