Across
- 2. An acronym for Remote Access Trojan. It is a type of malware that allows an attacker to secretly take complete remote control over the infected system.
- 3. Malware that disguises itself as a legitimate or desirable program to trick a user into downloading and executing it. It does not replicate itself.
- 5. A compromised computer or device controlled remotely by an attacker. These devices are often organized into a large network called a botnet for large-scale attacks.
- 8. A standalone malicious program that can self-replicate and spread across networks independently without requiring a host file or user interaction.
- 10. A specific type of Ransomware focused on encrypting the victim's data, making it unusable until a decryption key is provided.
- 11. Malicious software that locks or encrypts a victim's computer files or system and then demands a ransom (money) to restore access.
Down
- 1. Generally not malicious but undesirable, this refers to pre-installed, often unnecessary or resource-intensive software found on new devices by the manufacturer.
- 2. A collection of malicious tools designed to conceal the existence of other malware or malicious activity by modifying the operating system, often gaining privileged access.
- 4. A tool (hardware or software) that records every keystroke made on a computer's keyboard, used to capture sensitive information like usernames and passwords.
- 5. A hidden or undocumented method of bypassing normal authentication or security controls to allow an attacker unauthorized remote access to a system or network.
- 6. Bomb A piece of malicious code intentionally inserted into a software system that lies dormant until a specific condition is met (e.g., a certain date, a user deleting a file) to trigger its execution.
- 7. Software designed to secretly observe the user's activity, collect personal data (like passwords or financial info), and transmit it to a third party.
- 9. A type of malicious software that attaches itself to legitimate files or programs and requires a host program to be executed by the user to spread and cause damage.
