Malware

123456789
Across
  1. 4. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. 5. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. 6. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. 7. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. 8. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. 1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. 2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. 3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. 9. is a standalone malware computer program that replicates itself in order to spread to other computers