Malware and Attacks Crossword

12345678910
Across
  1. 1. another name for an infected computer
  2. 4. The type of malware that is a counterfeit version of an application
  3. 5. The type of malware that can self-replicate with the assistance of a host system
  4. 7. There are two types of user account permissions on a Windows system: standard and __________.
  5. 9. Software that is designed to intentionally cause harm to a device, server or network
  6. 10. What the malicious actor seeks when creating ransomware
Down
  1. 1. When data goes past the buffer region, it's known as a ____________.
  2. 2. a group of infected computers working together
  3. 3. PUP stands for potentially __________ programs.
  4. 6. API stands for application programming __________.
  5. 8. The type of malware that is used to obtain passwords, pin codes, credit card information from the keyboard of a victim