Across
- 4. is unwanted software that monitors and gathers information on a person and how they use their computer.
- 6. is a program that prevents malware attacks
- 8. This is a form of virus, as it is self-replicating.
- 9. designed specifically to target mobile devices
- 12. are a malicious form of self-replicating software.
Down
- 1. is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack.
- 2. is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- 3. is a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
- 5. is a large collection of malware-infected devices (zombies)
- 7. allows a user to maintain privileged access within a system without being detected.
- 10. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- 11. replicate themselves but do not attach themselves to files as a virus does
