Across
- 4. A method of cracking passwords by trying every possible combination.
- 7. A type of cyberattack where fake emails or websites are used to trick users into revealing private information.
- 8. Malware that encrypts files and demands payment to restore access.
- 10. A protective barrier that filters incoming and outgoing traffic to block unauthorized access.
- 11. A type of malware that replicates and spreads without user action, often via networks.
Down
- 1. A password-cracking attack that tries common words or phrases from a list.
- 2. Malware that monitors and records user activity, often stealing personal data.
- 3. Malware that hides itself while giving unauthorized users administrator-level access.
- 5. A program that attaches to other files and spreads when the infected file is executed.
- 6. A malicious program disguised as a legitimate one, used to access or damage a system.
- 9. Software that displays unwanted advertisements or redirects web traffic.
