Across
- 1. malware attached to another program (such as a document) which can replicate and spread after an initial execution on a target system where human interaction is required.
- 4. a network attack wherein threat actors force numerous systems (usually infected with malware) to send requests to a specific web server to crash, distract, or disrupt it enough that users are unable to connect to it.
- 6. programs that may include advertising, toolbars, and pop-ups that are unrelated to the software you downloaded.
- 8. What's the acronym for a program that creates a secure connection to the internet by encrypting all your online traffic and routing it through a point-to-point connection.
- 9. A group of computers that are under the control of a common operator and administered as one unit.
- 12. which company gives you cybersecurity for every one
- 16. A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
- 18. Firmware is software that is written to a hardware device's memory. It is used to run user programs on said devices.
- 19. a private network with restricted access.
- 20. a company that provides users with internet services.
Down
- 2. A type of malware that gathers information on a device and sends it to a third-party actor or organization that wouldn't normally have access.
- 3. the use of online advertising to distribute malware with little to no user interaction required.
- 5. Undesired communication, often an email or call, that gets sent out in bulk.
- 7. scams that attempt to obtain your information by presenting themselves as legitimate websites, then asking for your password, credit card details, or other sensitive information.
- 10. malicious software
- 11. A software program that allows users to control another system as if they have physical access to it.
- 13. programs that claim to perform one function but actually do another, typically malicious.
- 14. a term we use to generally describe a fake or false warning.
- 15. A 2-dimensional barcode. They are squares filled with black and white blocks invented to keep track of cars during manufacturing.
- 17. the process of changing data in a way that can not (easily) be undone (or decrypted) by parties that don't have a certain key.