Across
- 2. Software installed to a web browser to handle multimedia objects embedded in web pages. Use of most plug-in types is now deprecated.
- 5. Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.
- 7. Malware that hijacks computer resources to create cryptocurrency.
- 8. Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
- 10. Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).
- 11. Software that records information about a PC and its users, often installed without the user's consent.
- 12. Microsoft's file-level encryption feature available for use on NTFS.
- 13. Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
- 16. Class of malware that modifies system files, often at the kernel level, to conceal its presence.
- 18. Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.
- 19. Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
- 20. Computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.
Down
- 1. Malicious software or hardware that can record user keystrokes.
- 3. Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.
- 4. Add-on that uses the browser API to implement new functionality.
- 6. Security mechanism that locks the desktop after a period of inactivity and requires user to authenticate to resume.
- 9. Consequence of malware infection where DNS and/or search results are corrupted to redirect requests from legitimate site hosts to spoofed sites or ads.
- 14. Type of malware that replicates between processes in system memory and can spread over client/server network connections.
- 15. The process of isolating a file, computer system, or computer network to prevent the spread of a virus or another cybersecurity incident.
- 17. Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
