Malware

1234567891011121314151617
Across
  1. 2. A vulnerability in a computer system or application that can be used by attackers to gain unauthorized access or execute malicious code
  2. 6. Criminal activity that involves the use of a computer or the internet
  3. 9. A type of malware that can hide its existence or activities from users and security programs
  4. 10. A network of computers that have been infected with malware and are controlled by a remote attacker
  5. 13. A malicious program that disguises itself as a legitimate software
  6. 14. Malware that encrypts files or data on a computer or device and demands payment in exchange for the decryption key
  7. 15. The harmful or malicious part of a malware program
  8. 16. A method of tricking people into giving away sensitive information, such as usernames, passwords, or credit card numbers
  9. 17. Advertisements that pop up on a computer or device while using the internet
Down
  1. 1. The use of codes and ciphers to protect information and communications from unauthorized access or modification
  2. 3. Software that collects information about a user's activities or personal information without their knowledge or consent
  3. 4. A type of malware that can self-replicate and spread without human intervention
  4. 5. A type of malware that records keystrokes made on a computer or device
  5. 7. A secret method of bypassing normal authentication or gaining unauthorized access to a computer or device
  6. 8. A self-replicating program that can infect a computer or device and spread to other computers or devices
  7. 11. Software designed to harm or exploit a computer system or network
  8. 12. A computer or device that has been infected with malware and can be controlled remotely by an attacker