Across
- 5. bypasses anti-virus programs by tricking that it lies somewhere else than its real location
- 7. usually infect the web browser of the computer.
- 10. launch a broad flood of attacks
- 11. are some other viruses with different characteristics and different capabilities. They are not technically considered viruses, but they act like viruses and can cause the same damage.
- 13. disguises itself as desirable code
- 18. give hackers remote control of a victim's device
- 19. monitor users' keystrokes
- 20. change their code each time an infected file is executed.
- 22. spread usually through the Local Network Area (LAN) and the internet.
- 23. attack on the computer system occasionally
- 26. viruses are attached to certain links, ads, images, videos, and the layout of a website.
Down
- 1. attacks on a particular file type, typically .exe and .com files. The virus is considered 'non-resident' because it does not install itself
- 2. can infect the content of a file. These types of viruses can infect both standalone files as well as entire pieces of software, losing the original content. It is usually spread through email and is hard to identify for an average user. In most cases, you have to delete the infected files to remove the virus from your computer.
- 3. serves unwanted advertisements
- 4. is a type of virus that infects floppy disks or hard disks. It comprises all the files which are required to start the Operating system of the computer. The virus either overwrites the existing program or copies itself to another part of the disk.
- 6. attempts to bypass the detection of anti-virus software by installing themselves in the interrupt handler chain
- 8. affect the file allocation system of the computer’s hard drives.
- 9. designed using the same macro programming languages used for MS office package or other macro-based software applications
- 12. disables the victim's access to data until the ransom is paid
- 14. makes changes to files that are native to the OS
- 15. collects user activity data without their knowledge
- 16. infects mobile devices
- 17. is designed in such a way that it can automatically delete files on your computer system.
- 21. spread through a network by replicating themselves
- 24. usually tries to disable anti-virus software running on computer systems
- 25. is a type of malware with a single purpose: to erase user data beyond recoverability
