Across
- 2. Computer code that lies dormant until it is triggered by a specific logical event.
- 5. Malware that prevents a user's device from properly operating until a fee is paid
- 7. A general term used to describe software that spies on users by gathering information without consent
- 8. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerabilities.
- 9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
- 12. software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus
- 14. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
- 15. A separate program or a feature incorporated within a browser that stops popup advertisements from appearing.
- 17. A logical computer network of zombies under the control of an attacker
- 18. Software code that gives access to a program or a service that circumvents normal security protections.
Down
- 1. Software that is a cumulative package of all patches and feature updates.
- 3. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
- 4. A database of viruses that is used to identify an infected file
- 6. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
- 8. Hardware or software designed to limit the spread of malware.
- 10. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
- 11. An attacker who controls a botnet.
- 13. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
- 15. A publicly released software security update intended to repair a vulnerability.
- 16. An infected computer that is under the remote control of an attacker.