Malware-F

1234567891011121314151617181920
Across
  1. 5. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. 6. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  3. 10. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  4. 11. Not dangerous. Possibly beneficial.
  5. 12. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  6. 13. Malicious program that secretly records every keystroke typed by a computer’s owner.
  7. 14. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  8. 15. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  9. 17. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  10. 18. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  11. 19. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  12. 20. Someone who knows a lot about computers and loves to fool around with them.
Down
  1. 1. What the second "D" in "DDoS" stands for.
  2. 2. Term for a computer added to a botnet.
  3. 3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. 4. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  5. 7. A program that prevents, detects, and removes viruses or other malware from a computer system.
  6. 8. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  7. 9. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  8. 16. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.