Across
- 3. a program that performs unexpected or unauthorized, but always malicious, actions
- 4. programs that log keyboard activity
- 6. malicious program code designed to disrupt or damage computer systems
- 7. replicating code that requires no user interaction (such as opening an email or running a program) to spread
- 9. text files that contain information on user browsing habits
Down
- 1. types of viruses allow an attacker to gain control over or access into your computer
- 2. or hackers imitate legitimate companies in an attempt to steal personal information
- 5. classification for applications that have annoying, undesirable, or undisclosed behavior
- 8. hides its malicious actions by masquerading as something useful or desirable
