Across
- 2. a program/software designed to keep your location hidden/protect your personal information.
- 5. a type of malware that needs a host to spread.
- 7. the type of malware that provides remote access control to a device.
- 9. a two step security code, can be a fingerprint scan, face scan, voice, eye ID, etc.
- 11. When you go into the code of malware to figure out how it works, and deconstruct it.
- 15. a type of malware that may display many ads/pop ups.
Down
- 1. a type of malware that steals personal information and other data when on your computer.
- 3. a one step security code.
- 4. a type of malware that does many malicious things to your computer, like send spam, attack the DDoS, and spread more malware.
- 6. a type of malware that allows someone to have high system access to a computer, and also hides malware.
- 8. a type of malware that looks like something good or innocent, but is not once on your computer.
- 10. a type of malware that does not need a host to spread. (Can spread through internet, websites, etc.)
- 12. a software/program designed to let you browse through a fake device on your device, deterring some viruses from damaging your computer.
- 13. a type of malware that once it takes in effect, it may take hostage of something that you own digitally, whether it be money, apps, or all of your computer’s files.
- 14. Something that was programmed/coded specifically to harm your computer.
