Across
- 2. Someone who knows a lot about computers and loves to fool around with them.
- 8. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- 12. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- 13. A group of devices infected by malware given command and control to someone located elsewhere on the net.
- 14. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- 15. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- 19. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
- 1. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- 3. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- 4. Malicious program that secretly records every keystroke typed by a computer’s owner.
- 5. Term for a computer added to a botnet.
- 6. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- 7. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- 9. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- 10. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- 11. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- 13. Not dangerous. Possibly beneficial.
- 16. A program that prevents, detects, and removes viruses or other malware from a computer system.
- 17. What the second "D" in "DDoS" stands for.
- 18. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
