Malware
- Created by: revisemaster451
- Created on: 29-06-18 11:23
J | B | E | M | B | L | S | G | M | L | S | E | R | F | V | Y | U |
W | N | Q | X | F | V | Q | D | E | Q | R | A | S | W | E | N | J |
B | G | R | N | V | W | D | U | E | A | A | E | Q | S | S | C | K |
N | V | U | J | B | O | S | L | W | M | R | A | R | S | M | N | E |
I | W | O | S | V | R | Q | M | E | A | A | O | G | I | L | Q | Y |
W | O | B | D | M | M | O | R | W | N | H | G | V | F | E | F | R |
Q | A | J | U | I | S | A | Y | E | N | S | E | M | R | V | R | G |
E | W | A | K | N | W | P | O | A | X | I | C | A | M | Q | F | V |
H | G | K | A | L | S | C | J | C | T | X | W | X | G | M | N | G |
Q | I | R | A | K | G | O | B | H | B | D | F | P | S | B | R | S |
V | G | M | T | P | R | A | D | P | A | S | A | S | Y | J | V | W |
F | F | D | H | T | P | Q | B | W | N | E | U | M | M | N | T | T |
U | P | B | F | C | M | U | I | C | E | R | T | G | N | A | S | K |
S | U | M | T | V | G | I | M | W | I | U | D | B | I | E | V | N |
L | Q | V | O | E | U | W | W | V | X | Q | G | E | K | J | V | H |
K | Y | W | C | V | S | H | F | D | D | C | G | J | S | M | T | I |
Q | N | E | M | B | U | W | O | T | B | G | V | G | Q | T | Y | O |
Clues
- A virus is a piece of coding that is capable of copying itself and spreads when an infected file is opened (5)
- A worm is a piece of malware that replicates itself onto other computers through a network and doesn't need human help like a virus (4)
- Adware is malware that presents itself as unwanted advertisements to entice victims to click which allow the attacker to steal data (6)
- Malware (short for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the (7)
- Ransomware holds your data hostage and threatens to delete and damage it if money is not given. (10)
- Spyware monitors users actions via key tracking and websites that have been visited. This malware tracks victims activity to discover personal data (7)
- Trojan horse looks like a legitimate site or link but secretly steals your personal data through links and downloads. (6, 5)
Comments
No comments have yet been made