Malware & Social Engineering

12345678910111213
Across
  1. 2. locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. 6. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
  3. 10. malicious software
  4. 12. attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.
  5. 13. an attack designed to steal a victims password or other sensitive data. it involves the attacker watching while the victims provides sensitive information
Down
  1. 1. a large collection of malware connected devices
  2. 3. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data
  3. 4. replicate themselves but do not attach themselves to files
  4. 5. unwanted software that monitors and gathers information on a person and how they use their computer.
  5. 7. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  6. 8. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
  7. 9. a malicious form of self-replicating software.
  8. 11. automated programs that perform tasks repeatedly.