Across
- 5. is an attack designed to steal a victim's password or other sensitive data
- 8. is software that is designed to gain access to your computer with malicious intent.
- 11. The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.
- 12. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
Down
- 1. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving you personal data
- 2. a large collection of malware-infected devices (zombies).
- 3. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- 4. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- 6. self-replicating software.
- 7. unwanted software that monitors and gathers information on a person and how they use their computer.
- 9. self-replicating software that doesn't attach to files
- 10. automated programs that perform tasks repeatedly
