Icon Crear Crear

Common Threats

Crucigrama

Complete the crossword puzzle by entering the correct security threat.

Descarga la versión para jugar en papel

3 veces realizada

Creada por

Estados Unidos

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Crucigrama

Common ThreatsVersión en línea

Complete the crossword puzzle by entering the correct security threat.

por Jessica Luce
1

An unauthorized real-time interception of a private communication.

2

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.

3

A type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

4

An attempt to capture sensitive data such as usernames, passwords, and credit card details for malicious reasons.

5

A website or email address that is created to look like it comes from a legitimate source.

6

An attack intended to redirect a website’s traffic to another fake site.

7

Actions taken by a threat actor to gain unauthorized access to a computer.

8

Any software used to disrupt CPU or Mobile device operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

9

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

10

Software aimed to gather information about a person or organization without their knowledge.

11

. It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network.

12

A collection of robots, or ‘bots’, that create an army of infected computers which are remotely controlled by the originator.

13

Occurs when a malicious user gets a network of zombie computers to sabotage a specific website or server.

14

A set of stealthy continuous hacking processes orchestrated by a threat actor(s) targeting specific entity(s).

8
7
13
6
14
1
12
11
10
4
9
3
educaplay suscripción