Malware Detection

12345678910
Across
  1. 2. Examine a program's code or behavior to understand how it works, especially to uncover malicious functionality.
  2. 5. A type of malware that secretly records keystrokes to capture passwords and other private information.
  3. 8. A malicious program that encrypts a user's files and demands payment to restore them.
  4. 10. A a network of compromised devices controlled remotely by an attacker; attackers use them for DDoS attacks, sending spam, or mining cryptocurrency.
Down
  1. 1. A self‑replicating malware that can spread across networks without attaching to files
  2. 3. A type of malware that requires a host file to propagate and often needs user action to spread.
  3. 4. Type of reverse engineering analysis that involves running the program in a sandbox while monitoring file, registry, and network changes.
  4. 6. An isolated environment where analysts run suspicious code safely to observe behavior without risking production systems.
  5. 7. A malware that disguises itself as legitimate software or hides inside legitimate software to trick users into running it.
  6. 9. Type of reverse engineering analysis involving inspection of binary strings or disassembling code.