Across
- 2. software that secretly monitors users
- 3. malicious software designed to harm
- 5. malicious code attached to programs
- 7. fakes identity to deceive targets
- 9. fraudulent emails to steal information
- 11. network of compromised devices remotely controlled
- 12. gains unauthorized access to systems
- 13. takes advantage of system vulnerabilities
- 16. malware that tricks users into running
- 17. testing system defenses for weaknesses
- 18. secret way to bypass security
- 19. converts data into secret code
Down
- 1. records keystrokes for stealing data
- 4. displays unwanted advertisements to users
- 6. hides malicious software from detection
- 8. network protection from unauthorized access
- 10. self-replicating malware spreading automatically
- 14. malware disguised as legitimate software
- 15. demands payment to restore access
- 20. fixes security vulnerabilities in software
