J808 4.1 Types of Threats

1234567891011121314
Across
  1. 2. Malware that allows a cyber-security attacker to take control of an infected computer.
  2. 3. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. 6. When someone deceives by pretending to be someone else in order to get personal data.
  4. 8. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  5. 9. A destructive computer program that bores its way through a computer's files or through a computer's network.
  6. 10. Collection of captured bot computers
  7. 12. Software that encrypts programs and data until a ransom is paid to remove it.
  8. 14. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
  1. 1. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  2. 3. An error in a program that prevents the program from running as expected.
  3. 4. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
  4. 5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  5. 7. A type of Malware that locates and saves data from users without them knowing about it.
  6. 11. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  7. 13. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.