Malware
Across
- 3. inserts itself into an application and executes when the app is run
- 6. performs automated tasks on command
- 7. uses encryption to disable a target’s access to its data until a ransom is paid
- 8. doesn’t install anything initially, instead, it makes changes to files
- 10. gives malicious actors remote control of a victim’s computer
- 11. collects information about users’ activities without their knowledge or consent
- 12. has legitimate uses, businesses and schools use them
Down
- 1. collects information about users’ activities without their knowledge or consent
- 2. erases user data and ensures it can’t be recovered
- 4. target vulnerabilities in operating systems to install themselves into networks
- 5. target mobile devices
- 9. disguises itself as desirable code or software