Across
- 3. Spreads without user interaction
- 6. Malicious software
- 7. Documents user key inputs
- 8. Unauthorized file encryption
- 10. mimics a legitimate program
- 11. Used to launch DDoS attacks
Down
- 1. Malicious advertising
- 2. Unauthorized monitoring of user activities
- 4. Unwanted performance hindering software
- 5. Damages files and spreads across devices
- 8. Used to take remote control over a device
- 9. The bypassing of a security system
