Malware

123456789101112
Across
  1. 3. inserts itself into an application and executes when the app is run
  2. 6. performs automated tasks on command
  3. 7. uses encryption to disable a target’s access to its data until a ransom is paid
  4. 8. doesn’t install anything initially, instead, it makes changes to files
  5. 10. gives malicious actors remote control of a victim’s computer
  6. 11. collects information about users’ activities without their knowledge or consent
  7. 12. has legitimate uses, businesses and schools use them
Down
  1. 1. collects information about users’ activities without their knowledge or consent
  2. 2. erases user data and ensures it can’t be recovered
  3. 4. target vulnerabilities in operating systems to install themselves into networks
  4. 5. target mobile devices
  5. 9. disguises itself as desirable code or software