Malware-H

1234567891011121314151617181920
Across
  1. 3. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  2. 4. A program that prevents, detects, and removes viruses or other malware from a computer system.
  3. 6. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  4. 8. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  5. 10. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. 11. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  7. 13. Someone who knows a lot about computers and loves to fool around with them.
  8. 14. Malicious program that secretly records every keystroke typed by a computer’s owner.
  9. 16. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  10. 18. Not dangerous. Possibly beneficial.
  11. 19. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  12. 20. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
  1. 1. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  2. 2. What the second "D" in "DDoS" stands for.
  3. 5. Term for a computer added to a botnet.
  4. 7. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  5. 9. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  6. 12. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. 15. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  8. 17. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.