U11 Cyber Threats

1234567891011121314
Across
  1. 4. Malicious code that attaches to files and spreads when opened.
  2. 8. Malware disguised as legitimate software.
  3. 9. Deliberate destruction or disruption of systems.
  4. 10. Tool that records every keystroke made by a user.
  5. 11. Fake alerts designed to trick users into downloading malware.
  6. 12. Software that hides the existence of malware.
  7. 13. Intercepting data packets on a network.
  8. 14. Publishing private information about someone online.
Down
  1. 1. Fraudulent attempt to obtain sensitive information via email.
  2. 2. Software that secretly monitors user activity.
  3. 3. Network of infected devices controlled remotely.
  4. 5. Malware that encrypts data and demands payment.
  5. 6. Self-replicating malware that spreads across networks.
  6. 7. Hidden method of bypassing normal authentication.
  7. 11. Impersonating another device or user to gain access.