Malicious Codes and Secure Environments

12345678910111213141516171819
Across
  1. 2. The "directory tree" or list of folders where a file is located.
  2. 5. The software that enables virtualization by creating an interface between the VM and host hardware.
  3. 7. The built-in SuperUser account in Linux that has all administrative privileges.
  4. 9. The physical computer that runs a virtual machine.
  5. 10. A Potentially Unwanted Program that often comes bundled with freeware.
  6. 11. A graphical interface that uses pictures and menus for commands.
  7. 12. A program that blocks access to files or a device until a ransom is paid.
  8. 14. A text-based interface used to operate a computer.
  9. 15. A Virtual Machine, which is a guest computer running inside a host computer.
  10. 17. Unsolicited commercial email, also known as electronic junk mail.
  11. 18. A security barrier created by separating software from hardware, often using virtualization.
  12. 19. Software that displays unwanted advertisements like pop-ups or banners.
Down
  1. 1. A type of spyware that records a user's keystrokes.
  2. 3. The text-based command window in a CLI, also known as a shell or command prompt.
  3. 4. Technology that allows one computer to run multiple operating systems at the same time.
  4. 6. A symbol, like $ or >, indicating the computer is ready for a command.
  5. 8. A command that allows a user to run another command with administrator or "SuperUser" privileges.
  6. 13. Software that secretly gathers user data and sends it to a third party.
  7. 16. Malicious software designed to harm a computer.