1 | 8 | ||||||||||||||||||||||
2 | |||||||||||||||||||||||
3 | |||||||||||||||||||||||
7 | |||||||||||||||||||||||
4 | 9 | ||||||||||||||||||||||
5 | |||||||||||||||||||||||
6 | |||||||||||||||||||||||
1. Malware that secretly gathers information about a person or organization without their consent.
2. A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network.
3. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
4. Malware that displays unwanted advertisements or redirects browsers to advertising websites.
5. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
6. A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity.
7. Malicious software designed to harm or exploit computers or networks.
8. Malware that encrypts a victim's files or locks their computer, demanding a ransom for their release.
9. A type of malware that self-replicates and infects other files or systems.