Types of Cyber Threats & Malwares Crossword Puzzle

1234567891011
Across
  1. 3. A method of hiding malicious code in legitimate files.
  2. 6. A software that secretly gathers user information without consent.
  3. 8. A program that allows unauthorized remote access.
  4. 9. A network of infected devices controlled remotely by hackers
  5. 11. A program that appears legitimate but contains harmful code.
Down
  1. 1. A software that secretly records keystrokes.
  2. 2. A malicious software that locks files and demands a ransom.
  3. 4. A type of malware that spreads by copying itself.
  4. 5. A malware designed to hide its presence and maintain privileged access.
  5. 7. A type of cyber attack where fake emails trick users.
  6. 10. A cyber attack that floods a network to disrupt services.