Malware
Across
- 6. The data on a victim's computer is locked (typically by encryption) and payment is demanded before the ransomed data is decrypted and access is returned to the victim.
- 7. Records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
- 8. Clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.
- 10. Primary function is to self-replicate and infect other computers while remaining active on infected systems.
- 11. Networks of hijacked computer devices used to carry out various scams and cyberattacks.
Down
- 1. Designed to steal personal information or perform some other illegal operation.
- 2. Is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
- 3. The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- 4. Displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device.
- 5. Any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
- 9. Downloads onto a computer disguised as a legitimate program.