Across
- 2. Automated programs that perform tasks repeatedly.
- 8. A worm, virus, or Trojan. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- 10. Methods used by cybercriminals to deceive individuals into handing over sensitive information.
- 11. Spread through the network and use the system’s resources.
- 12. Unwanted software that monitors and gathers information on a person and how they use their computer.
Down
- 1. A type of virus that disguises itself as something else, like a game but actually causes harm.
- 3. When the attacker watches a victim when they are providing sensitive information.
- 4. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- 5. Are a malicious form of self-replicating software.
- 6. A large collection of malware-infected devices (zombies). This type of attack is called DDoS.
- 7. An attack where the victim receives an email disguised to look like it has come from a reputable source and tricks them into giving up valuable data.
- 9. This locks computers and encrypts data, and demands a ransom to unlock the files.
