SAMPLE
Across
- 5. Malicious software disguised as legitimate software to trick users into installing it.
- 6. Software that automatically displays or downloads advertisements.
- 7. Software that secretly monitors user activity and collects personal information.
- 9. Tools that allow unauthorized users to gain control of a computer without being detected.
- 10. Standalone malware that replicates itself to spread to other computers.
Down
- 1. Networks of infected computers that can be controlled remotely to perform malicious tasks.
- 2. A cyber attack that hijacks computing resources to mine cryptocurrency without the owner's consent, leading to increased costs and degraded system performance. type of rootkit that infects the master boot record to load malicious code before the operating system.
- 3. Programs that record keystrokes to capture sensitive information like passwords.
- 4. Malware that encrypts files and demands payment for their release.
- 8. Malicious code that attaches itself to clean files and spreads throughout a computer system.