3.1 Malware Vocabulary Practice

123456789101112
Across
  1. 4. prevents a user's endpoint device from properly and fully functioning until a fee is paid
  2. 6. tracking software that is deployed without the consent or control of the user
  3. 8. computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
  4. 10. malware that can hide its presence and the presence of other malware on the computer
  5. 12. a malicious program that uses a computer network to replicate
Down
  1. 1. type of malware that imprisons users and encrypts all files on the device so that none of them can be opened
  2. 2. does not attach itself to a file
  3. 3. gives access to a computer, program, or service that circumvents any normal security protections
  4. 5. silently captures and stores each keystroke that a user types on the computer's keyboard
  5. 7. software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action
  6. 9. Infected robot computer
  7. 11. an executable program that masquerades as performing a benign activity but also does something malicious