Malware Detection
Across
- 2. Examine a program's code or behavior to understand how it works, especially to uncover malicious functionality.
- 5. A type of malware that secretly records keystrokes to capture passwords and other private information.
- 8. A malicious program that encrypts a user's files and demands payment to restore them.
- 10. A a network of compromised devices controlled remotely by an attacker; attackers use them for DDoS attacks, sending spam, or mining cryptocurrency.
Down
- 1. A self‑replicating malware that can spread across networks without attaching to files
- 3. A type of malware that requires a host file to propagate and often needs user action to spread.
- 4. Type of reverse engineering analysis that involves running the program in a sandbox while monitoring file, registry, and network changes.
- 6. An isolated environment where analysts run suspicious code safely to observe behavior without risking production systems.
- 7. A malware that disguises itself as legitimate software or hides inside legitimate software to trick users into running it.
- 9. Type of reverse engineering analysis involving inspection of binary strings or disassembling code.