MALWARE

123456789101112131415161718
Across
  1. 2. allows criminals to control computers remotely
  2. 4. tracks the user's history
  3. 5. can spread across the system in own, similar to virus
  4. 10. it's a software that falls in a gray area
  5. 12. misleading malware
  6. 13. designed to automate cybercime
  7. 14. take complete control of system
  8. 16. BOMB utilizes a trigger to initiate the vindictive code
  9. 17. secretly observe the computer user's activity
Down
  1. 1. infect endpoint's computing power to mine cryptocurrency like bitcoin
  2. 3. appears to be a legitimate software
  3. 6. locks and encrypts the victim's data files
  4. 7. checks to see if that computer is connected to specific models of programmable logic controllers (PLCs) manufactured by Siemens.
  5. 8. Makes changes to files that are native to the OS
  6. 9. infects other programs and spread to other system
  7. 11. records all the user's key stokes
  8. 15. perform automated task on command.
  9. 18. Erases user data beyond recoverability