Across
- 3. infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
- 7. when human users of a system are tricked into providing confidential information
- 9. software that automatically checks for available updates
- 11. software that scans any file that is able to execute code
- 12. large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system
- 13. unwanted software that monitors and gathers information
Down
- 1. Trojans, spyware, adware, and worms are all examples of this
- 2. these replicate themselves but do not attach themselves to files as a virus does
- 4. locks a computer, encrypts files, and therefore prevents the user from being able to access the data
- 5. malicious form of self-replicating software
- 6. checks incoming and outgoing network traffic
- 8. piece of software that appears to perform a useful function
- 10. automated programs that perform tasks repeatedly
