Across
- 5. a set of of software tools used by an attack to hide the actions or presence of other types of malicious software
- 6. Software that scans the computer as well as any new documents for viruses
- 9. a malicious program designed to enter a computer via a network to take advantage of vulnerability in an application or an operating system
- 13. a logical computer network of zombies under the control of an attacker
- 14. malware that can trigger arbitrary code execution from one computer to a second computer over a etwork or the internet
- 15. a separate program or feature incorporated within a browser that stops popup advertisement from appearing
- 17. an infected computer that is under the remote control of an attacker
- 18. Hardware or software that limits the spread of malware
- 20. software that is a cumulative package of all patches and features updates
Down
- 1. software code that allows one incirconventing normal security measures
- 2. a database of viruses that is used to identify an infected file
- 3. Software that helps prevent computers from being infected by spyware
- 4. Malware that prevents a users device from working properly until a fee is paid
- 7. an attacker who controls a botnet
- 8. enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
- 10. an executable program that is advertised as performing one activity but actually performs a malicious activity
- 11. a general term used to describe software that spies on users by gathering information without consent
- 12. Computer code that lies dormant until triggered by a specific logical event
- 16. software of a hardware device that captures and stores each keystroke that a user types on the computers keyboard
- 19. a public release software security update intended to repair a vulnerability