Across
- 3. Software that modifies a web browser's settings without a user's permission to inject unwanted advertising into the user's browser
- 8. Another type of malware that uses a backdoor and named after the wooden horse that the Greeks used to infiltrate Troy
- 10. A malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR)
- 11. An undocumented way of accessing a system, bypassing the normal authentication mechanisms
- 12. In contrast to viruses, which require the spreading of an infected host file, this is a standalone software and does not require a host program or human help to spread
- 13. Network Security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 15. It spreads from one computer to another, leaving infections as it travels
- 16. The action of recording (logging) the keys struck on a keyboard, typically secretively, so that the person using the keyboard is unaware that their actions are being monitored
Down
- 1. Software that aims to gather information about a person or organization without their knowledge
- 2. Is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
- 4. Software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process
- 5. A type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- 6. Short for "Denial of Service" Attacks, which is a malicious attempts by one or more people to cause the victim, site, or node to deny service to its customers
- 7. Is derived from the word "robot" and is an automated process that interacts with other network services
- 9. Also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks
- 14. May reside at the user or kernel level in the operating system or lower to include a hypervisor, master boot record, or the system firmware
