Malware
Across
- 4. A method by which authorized and unauthorized users can bypass normal security measures and gain high-level user access on a computer system, network, or software.
- 8. A type of rootkit that infects the master boot record (MBR) or volume boot record (VBR) of a computer, allowing it to execute malicious tasks at boot time, before the operating system loads.
- 9. Computers that have been compromised by a hacker, computer virus, or Trojan horse and can be used to perform malicious tasks under remote direction.
- 10. (Distributed Denial of Service) An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
- 11. Malicious code that is injected into web pages viewed by the user, often used to steal information such as login credentials or credit card details.
- 16. Previously unknown vulnerabilities in software, which are not yet known to the vendor and therefore have no patch available at the time they are exploited.
- 17. A type of malware designed to install or "drop" other malware onto the targeted system, often used to evade detection by antivirus programs.
- 21. A collection of malicious software tools that grant unauthorized access to the root (or core) of a computing system while hiding its presence.
- 22. Malware that encrypts the victim's data, making it inaccessible, and demands a ransom payment to decrypt it.
- 23. Networks of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to transmit spam or launch attacks.
- 25. Software that a user may perceive as unwanted, despite having consented to download it, often included in software bundles.
- 26. Automated software programs that perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.
- 27. Malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.
Down
- 1. Kits Packages of exploits that allow cybercriminals to take advantage of vulnerabilities in software to distribute malware or perform other malicious activities.
- 2. Fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- 3. (Command and Control servers) Servers that are used by cybercriminals to send commands to systems compromised by malware and to receive stolen data from a target network.
- 5. A type of malware that downloads and installs other malware from the internet onto the infected computer.
- 6. Software that performs a task autonomously. Malicious agents can act as a payload of malware or part of a botnet.
- 7. Software designed to display advertisements on your computer, sometimes within a software application or using intrusive pop-up windows.
- 12. Software used to dial telephone numbers automatically. When used maliciously, dialers can call premium-rate numbers, generating charges.
- 13. Tools used to compress a software executable, often used by developers to reduce the size of their software but can also be used by malware authors to obscure their code from antivirus.
- 14. Malicious programs that misrepresent themselves to appear useful, but secretly carry out illicit activities when executed.
- 15. Malware that records keystrokes made by a user to steal credentials, personal information, or financial information.
- 18. False warnings typically spread via email about non-existent threats, designed to trick users into deleting legitimate files or buying and installing unnecessary software.
- 19. Malware that replicates itself in order to spread to other computers, often using a network to spread itself without user intervention.
- 20. Access Tools**: Software tools that provide the capability to access and control a computer or network remotely. They can be used for legitimate purposes but are also utilized by attackers for malicious activities.
- 24. Malware that secretly observes the computer user's activities without permission and reports it to the software's author.