Across
- 2. A file type used in Windows that allows programs to share instructions in a single file
- 4. A programming method used to render code as unreadable
- 5. Malicious software or code that damages an infected endpoint
- 9. Malware that is set off by a particular event, such as a specific date
- 12. Malware that can lock a computer with an encryption key
- 13. Malware that is installed in the BIOS of a computer and provides root-level access to a computer
- 14. Abuses Telegram's Bot API for data theft
- 16. Targets a computer network and does not need to be executed by a user or process
- 17. Enables an attacker to use endpoints in a strategic manner to unload payloads
Down
- 1. A sequence of commands that takes advantage of a system vulnerability
- 3. Alters malware code to change the decryption routine
- 6. A cryptographic representation of a programs source code
- 7. A removable magnetic storage device, commonly available in 8-inch sizes
- 8. Malware that gives attackers the ability to bypass authentication for system access
- 10. A flaw that exists in a system that creates a security risk
- 11. Self-replicating malware that must infect a host program
- 15. Horse Malware disguised as a regular program that grants attackers access to an infected endpoint
