3.1 Malware

12345678910
Across
  1. 1. tracking software that is deployed without the consent or control of the user
  2. 5. an executable program that masquerades as performing a benign activity but also does something malicious
  3. 6. silently captures and stores each keystroke that user types
  4. 7. gives access to a computer, program, or service that circumvents any normal security protections
  5. 8. malware that encrypts all the files on the device
  6. 10. a malicious program that uses a computer network to replicate
Down
  1. 2. Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid
  2. 3. malware that can hide its presence and the presence of other malware on the computer
  3. 4. bomb computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
  4. 7. infected robot computer
  5. 9. software that the user does not want on their computer