Malware

123456789101112131415161718192021222324252627
Across
  1. 4. A method by which authorized and unauthorized users can bypass normal security measures and gain high-level user access on a computer system, network, or software.
  2. 8. A type of rootkit that infects the master boot record (MBR) or volume boot record (VBR) of a computer, allowing it to execute malicious tasks at boot time, before the operating system loads.
  3. 9. Computers that have been compromised by a hacker, computer virus, or Trojan horse and can be used to perform malicious tasks under remote direction.
  4. 10. (Distributed Denial of Service) An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
  5. 11. Malicious code that is injected into web pages viewed by the user, often used to steal information such as login credentials or credit card details.
  6. 16. Previously unknown vulnerabilities in software, which are not yet known to the vendor and therefore have no patch available at the time they are exploited.
  7. 17. A type of malware designed to install or "drop" other malware onto the targeted system, often used to evade detection by antivirus programs.
  8. 21. A collection of malicious software tools that grant unauthorized access to the root (or core) of a computing system while hiding its presence.
  9. 22. Malware that encrypts the victim's data, making it inaccessible, and demands a ransom payment to decrypt it.
  10. 23. Networks of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to transmit spam or launch attacks.
  11. 25. Software that a user may perceive as unwanted, despite having consented to download it, often included in software bundles.
  12. 26. Automated software programs that perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.
  13. 27. Malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.
Down
  1. 1. Kits Packages of exploits that allow cybercriminals to take advantage of vulnerabilities in software to distribute malware or perform other malicious activities.
  2. 2. Fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  3. 3. (Command and Control servers) Servers that are used by cybercriminals to send commands to systems compromised by malware and to receive stolen data from a target network.
  4. 5. A type of malware that downloads and installs other malware from the internet onto the infected computer.
  5. 6. Software that performs a task autonomously. Malicious agents can act as a payload of malware or part of a botnet.
  6. 7. Software designed to display advertisements on your computer, sometimes within a software application or using intrusive pop-up windows.
  7. 12. Software used to dial telephone numbers automatically. When used maliciously, dialers can call premium-rate numbers, generating charges.
  8. 13. Tools used to compress a software executable, often used by developers to reduce the size of their software but can also be used by malware authors to obscure their code from antivirus.
  9. 14. Malicious programs that misrepresent themselves to appear useful, but secretly carry out illicit activities when executed.
  10. 15. Malware that records keystrokes made by a user to steal credentials, personal information, or financial information.
  11. 18. False warnings typically spread via email about non-existent threats, designed to trick users into deleting legitimate files or buying and installing unnecessary software.
  12. 19. Malware that replicates itself in order to spread to other computers, often using a network to spread itself without user intervention.
  13. 20. Access Tools**: Software tools that provide the capability to access and control a computer or network remotely. They can be used for legitimate purposes but are also utilized by attackers for malicious activities.
  14. 24. Malware that secretly observes the computer user's activities without permission and reports it to the software's author.