malware program

123456789101112
Across
  1. 2. is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
  2. 6. is a computer software package that performs a specific function directly for an end user or, in some cases
  3. 7. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
  4. 11. also known as advertisement-supported software, generates revenue for its developers by automatically generating adverts on your screen
  5. 12. data can be a number, symbol, character, word, codes, graphs, etc.
Down
  1. 1. is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
  2. 3. the state of being free from public attention.
  3. 4. is a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. Malicious software - known as malware - is code that can harm your computers and laptops, and the data on them.
  4. 5. Ransomware is malware that employs encryption to hold a victim’s information at ransom.
  5. 8. defines any legitimate programs that pose potential risks due to security vulnerability, software incompatibility, or legal violations.
  6. 9. is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
  7. 10. Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.