1 | 7 | |||||||||||||||||||||||
9 | ||||||||||||||||||||||||
2 | 8 | |||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
1. A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network.
2. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
3. A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity.
4. Malicious software designed to harm or exploit computers or networks.
5. Malware that displays unwanted advertisements or redirects browsers to advertising websites.
6. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
7. Malware that encrypts a victim's files or locks their computer, demanding a ransom for their release.
8. Malware that secretly gathers information about a person or organization without their consent.
9. A type of malware that self-replicates and infects other files or systems.