Across
- 4. Malware that demands money to release access to resources it encrypted.
- 5. Virus that infects boot sector and Master Boot Record.
- 7. Virus that Word and Excel files.
- 9. Software that identify and remove malware from a computer.
- 10. Malware that snoops the user's activity and send back information gathered to the hacker.
Down
- 1. Malware that conceals itself in a software and seems legitimate.
- 2. Malware that gains administrator privileges to the host system.
- 3. File injecting Virus.
- 6. Malware that replicates itself and consumes lots of memory space.
- 8. Software or hardware that prevents unauthorized access to a computer.