MALWARE
Across
- 2. allows criminals to control computers remotely
- 4. tracks the user's history
- 5. can spread across the system in own, similar to virus
- 10. it's a software that falls in a gray area
- 12. misleading malware
- 13. designed to automate cybercime
- 14. take complete control of system
- 16. BOMB utilizes a trigger to initiate the vindictive code
- 17. secretly observe the computer user's activity
Down
- 1. infect endpoint's computing power to mine cryptocurrency like bitcoin
- 3. appears to be a legitimate software
- 6. locks and encrypts the victim's data files
- 7. checks to see if that computer is connected to specific models of programmable logic controllers (PLCs) manufactured by Siemens.
- 8. Makes changes to files that are native to the OS
- 9. infects other programs and spread to other system
- 11. records all the user's key stokes
- 15. perform automated task on command.
- 18. Erases user data beyond recoverability