Across
- 2. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- 5. is a software application that runs automated tasks on the Internet, usually with the intent to imitate human activity, such as messaging, on a large scale.
- 7. a thing that takes over your computer
- 9. a malware that records possible keystrokes to record what you've been searching
- 10. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- 11. A malware that recommends you things that you've been looking at recently or websites you've been to
Down
- 1. a type of cryptovirological malware that permanently block access to the victim's personal data unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion.
- 3. a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
- 4. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- 6. is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. Trojans are generally spread by some form of social engineering.
- 7. ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013.
- 8. is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in malware and in legitimate software.
