Malware and Ransomware

1234567891011121314151617181920
Across
  1. 1. A logic bomb is malware that is triggered by a specified condition, such as a given date or a particular user account being disabled
  2. 4. removable magnetic storage from the 70s
  3. 6. contains information about how the logical partitions are organized
  4. 9. contains machine code that is loaded into an endpoint’s memory by firmware during the startup process, before the operating system is loaded
  5. 11. malicious software or code, or damages an infected endpoint
  6. 14. allows an attacker to bypass authentication to gain access to a compromised system
  7. 15. gives an attacker full control and elevated privileges of an endpoint when installed
  8. 16. targets a computer network by replicating itself to spread rapidly
  9. 17. A virus is malware that is self-replicating but must first infect a host program and be executed by a user or process.
  10. 19. bug or flaw that exists in a system or software and creates a security risk
  11. 20. bug or flaw that exists in a system or software and creates a security risk
Down
  1. 2. A bootkit is malware that is a kernel-mode variant of a rootkit, commonly used to attack computers that are protected by full-disk encryption.
  2. 3. targets the boot sector or master boot record (MBR) of an endpoint’s storage drive or other removable storage media
  3. 5. A rootkit is malware that provides privileged (root-level) access to a compute
  4. 7. malware that disables legitimately installed antivirus software
  5. 8. Infects you to constantly show you different ads or collect your info to send you ads
  6. 10. abuses Telegram’s Bot API for C2 and data exfiltration
  7. 12. string of commands that leverages a vulnerability in a system or software
  8. 13. Ransomware is malware that locks a computer or device
  9. 18. collect information, such as internet surfing behavior, login credentials, and financial account information