Across
- 4. a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
- 5. malicious code that replicates by independently exploiting vulnerabilities in networks.
- 9. holds a computer system, or the data it contains, captive until the target makes a payment
- 10. an attacker requests personal information from a party in exchange for something, like a gift.
- 11. displays annoying pop-ups to generate revenue for its authors
- 14. non-technical means for a criminal to gather information on a target
- 15. malware that carries out malicious operations under the guise of a desired operation such as playing an online game
Down
- 1. software that enables a criminal to obtain information about a user’s computer activities.
- 2. phishing using voice communication technology
- 3. takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
- 6. malicious software
- 7. This type of malware remains inactive until that trigger event happens.
- 8. program or code introduced by a criminal who has compromised a system.
- 12. modifies the operating system to create a backdoor.
- 13. malicious executable code attached to another executable file, such as a legitimate program.
