Malware

1234567891011
Across
  1. 6. The data on a victim's computer is locked (typically by encryption) and payment is demanded before the ransomed data is decrypted and access is returned to the victim.
  2. 7. Records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  3. 8. Clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.
  4. 10. Primary function is to self-replicate and infect other computers while remaining active on infected systems.
  5. 11. Networks of hijacked computer devices used to carry out various scams and cyberattacks.
Down
  1. 1. Designed to steal personal information or perform some other illegal operation.
  2. 2. Is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  3. 3. The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
  4. 4. Displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device.
  5. 5. Any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
  6. 9. Downloads onto a computer disguised as a legitimate program.