Across
- 1. tracking software that is deployed without the consent or control of the user
- 5. an executable program that masquerades as performing a benign activity but also does something malicious
- 6. silently captures and stores each keystroke that user types
- 7. gives access to a computer, program, or service that circumvents any normal security protections
- 8. malware that encrypts all the files on the device
- 10. a malicious program that uses a computer network to replicate
Down
- 2. Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid
- 3. malware that can hide its presence and the presence of other malware on the computer
- 4. bomb computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
- 7. infected robot computer
- 9. software that the user does not want on their computer
