Across
- 3. Hostage code
- 4. Self replicating without input
- 8. Pre-OS machine code
- 9. Set of instructions for multiple apps
- 10. First virus made by 9th grader
- 12. Disguised Code
- 13. disk old magnetic storage
- 15. Total access
- 16. Data collecting code
Down
- 1. a representation of a programs source code
- 2. code that bypasses authentication
- 5. Unexpected weakness
- 6. Malicious Code
- 7. Protection tampering
- 10. leverage weaknesses
- 11. Logical Trigger
- 14. Iterative malware code
