Malware-A

1234567891011121314151617
Across
  1. 3. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  2. 5. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  3. 7. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  4. 11. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  5. 12. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  6. 13. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. 15. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  8. 16. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  9. 17. A program that prevents, detects, and removes viruses or other malware from a computer system.
Down
  1. 1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. 2. Someone who knows a lot about computers and loves to fool around with them.
  3. 4. Not dangerous. Possibly beneficial.
  4. 6. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  5. 8. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  6. 9. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  7. 10. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. 13. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  9. 14. What the second "D" in "DDoS" stands for.