Across
- 2. Makes changes to files that are native to the OS
- 4. Infects mobile devices.
- 8. Monitors users' keystrokes
- 10. a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit
- 13. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- 15. Disable victim's access to data until ransom is paid
- 16. serves unwanted advertisements
- 18. an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders
- 19. Spreads through a network by replicating itself.
- 20. Disguises itself as desirable code
Down
- 1. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- 3. Gives hackers remote control of a victim's device.
- 5. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- 6. Collects user activity data without their knowledge
- 7. Erases user data beyond recoverability.
- 9. an online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online currency known as cryptocurrencies
- 11. a Trojan that is designed to gather information from a system
- 12. software designed to interfere with a computer's normal functioning,
- 14. a robust cyber security solution that adds an extra layer of security to your computer to protect against cyberattacks.
- 17. an automated malware program that can infect a system, steal data, or commit other fraudulent activities.
