Malware
Across
- 2. A vulnerability in a computer system or application that can be used by attackers to gain unauthorized access or execute malicious code
- 6. Criminal activity that involves the use of a computer or the internet
- 9. A type of malware that can hide its existence or activities from users and security programs
- 10. A network of computers that have been infected with malware and are controlled by a remote attacker
- 13. A malicious program that disguises itself as a legitimate software
- 14. Malware that encrypts files or data on a computer or device and demands payment in exchange for the decryption key
- 15. The harmful or malicious part of a malware program
- 16. A method of tricking people into giving away sensitive information, such as usernames, passwords, or credit card numbers
- 17. Advertisements that pop up on a computer or device while using the internet
Down
- 1. The use of codes and ciphers to protect information and communications from unauthorized access or modification
- 3. Software that collects information about a user's activities or personal information without their knowledge or consent
- 4. A type of malware that can self-replicate and spread without human intervention
- 5. A type of malware that records keystrokes made on a computer or device
- 7. A secret method of bypassing normal authentication or gaining unauthorized access to a computer or device
- 8. A self-replicating program that can infect a computer or device and spread to other computers or devices
- 11. Software designed to harm or exploit a computer system or network
- 12. A computer or device that has been infected with malware and can be controlled remotely by an attacker