Across
- 4. prevents a user's endpoint device from properly and fully functioning until a fee is paid
- 6. tracking software that is deployed without the consent or control of the user
- 8. computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
- 10. malware that can hide its presence and the presence of other malware on the computer
- 12. a malicious program that uses a computer network to replicate
Down
- 1. type of malware that imprisons users and encrypts all files on the device so that none of them can be opened
- 2. does not attach itself to a file
- 3. gives access to a computer, program, or service that circumvents any normal security protections
- 5. silently captures and stores each keystroke that a user types on the computer's keyboard
- 7. software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action
- 9. Infected robot computer
- 11. an executable program that masquerades as performing a benign activity but also does something malicious
