New Activity
Play Crossword Puzzle
1 An unauthorized real-time interception of a private communication.
2 A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.
3 A type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
4 An attempt to capture sensitive data such as usernames, passwords, and credit card details for malicious reasons.
5 A website or email address that is created to look like it comes from a legitimate source.
6 An attack intended to redirect a website’s traffic to another fake site.
7 Actions taken by a threat actor to gain unauthorized access to a computer.
8 Any software used to disrupt CPU or Mobile device operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.
9 Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.
10 Software aimed to gather information about a person or organization without their knowledge.
11 . It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network.
12 A collection of robots, or ‘bots’, that create an army of infected computers which are remotely controlled by the originator.
13 Occurs when a malicious user gets a network of zombie computers to sabotage a specific website or server.
14 A set of stealthy continuous hacking processes orchestrated by a threat actor(s) targeting specific entity(s).
8
7
13
5
6
14
2
1
12
11
10
4
9
3