Across
- 4. Malware changing behavior dynamically
- 5. Network traffic analysis tool
- 7. Attacker spreading across networks
- 10. Multiple layered security strategy
- 12. Compressing malware to hide code
- 13. Indicator showing compromise evidence
- 15. Malware operating primarily in memory
- 18. Infrastructure controlling infected systems
- 21. Isolated environment for safe execution
- 22. Windows executable file format
- 26. Detecting threats by activity patterns
- 27. Security model requiring verification
- 28. Malware requiring user execution to spread
- 29. macOS executable format
- 30. Linux executable format
- 32. Tool tracking system processes
- 33. Malware Malware using artificial intelligence techniques
- 34. Gaining higher system permissions
- 35. Examining malware without execution
- 37. Endpoint detection and response security
- 38. Secure hashing algorithm for identification
Down
- 1. Extended threat detection platform
- 2. Proactive search for attackers
- 3. Executing code inside running processes
- 6. Using system scripting tools maliciously
- 8. Small payload executed in memory
- 9. Command showing network connections
- 11. Social engineering used to deliver malware
- 12. Technique allowing malware survival after reboot
- 14. Startup registry location abused by malware
- 16. Dedicated malware inspection system
- 17. Converting binaries into assembly code
- 19. Software designed to damage systems or steal data
- 20. Studying malware behavior during execution
- 23. Making code difficult to analyze
- 24. Creating digital fingerprint of files
- 25. Self replicating malware spreading automatically
- 30. Code abusing system vulnerability
- 31. Automated execution used for persistence
- 36. Startup program monitoring utility
