Icon Créer jeu Créer jeu

Common Threats

Mots Croisés

Complete the crossword puzzle by entering the correct security threat.

Téléchargez la version pour jouer sur papier

3 fois fait

Créé par

United States

Top 10 résultats

Il n'y a toujours pas de résultats pour ce jeu. Soyez le premier à apparaître dans le classement! pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

Common ThreatsVersion en ligne

Complete the crossword puzzle by entering the correct security threat.

par Jessica Luce
1

An unauthorized real-time interception of a private communication.

2

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.

3

A type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

4

An attempt to capture sensitive data such as usernames, passwords, and credit card details for malicious reasons.

5

A website or email address that is created to look like it comes from a legitimate source.

6

An attack intended to redirect a website’s traffic to another fake site.

7

Actions taken by a threat actor to gain unauthorized access to a computer.

8

Any software used to disrupt CPU or Mobile device operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

9

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

10

Software aimed to gather information about a person or organization without their knowledge.

11

. It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network.

12

A collection of robots, or ‘bots’, that create an army of infected computers which are remotely controlled by the originator.

13

Occurs when a malicious user gets a network of zombie computers to sabotage a specific website or server.

14

A set of stealthy continuous hacking processes orchestrated by a threat actor(s) targeting specific entity(s).

8
7
13
6
14
1
12
11
10
4
9
3
educaplay suscripción