Malware

1234567891011121314151617181920
Across
  1. 2. Makes changes to files that are native to the OS
  2. 4. Infects mobile devices.
  3. 8. Monitors users' keystrokes
  4. 10. a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit
  5. 13. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  6. 15. Disable victim's access to data until ransom is paid
  7. 16. serves unwanted advertisements
  8. 18. an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders
  9. 19. Spreads through a network by replicating itself.
  10. 20. Disguises itself as desirable code
Down
  1. 1. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. 3. Gives hackers remote control of a victim's device.
  3. 5. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
  4. 6. Collects user activity data without their knowledge
  5. 7. Erases user data beyond recoverability.
  6. 9. an online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online currency known as cryptocurrencies
  7. 11. a Trojan that is designed to gather information from a system
  8. 12. software designed to interfere with a computer's normal functioning,
  9. 14. a robust cyber security solution that adds an extra layer of security to your computer to protect against cyberattacks.
  10. 17. an automated malware program that can infect a system, steal data, or commit other fraudulent activities.