Across
- 5. A virus that mutates with every infection, making detection by the "signature" of the virus impossible
- 7. A program inserted into software by an intruder and lies dormant until a predefined condition is met
- 8. Advertising that is integrated into software
- 11. Malware that encrypts the user's data and demand payment in order to access the key needed to recover the information
- 14. Any mechanism that bypasses a normal security check
- 15. Program activated on an infected machine that is activated to launch attacks on other machines
- 17. Set of hacker tools used after the attacker has broken into a computer system and gained root-level access
- 19. Code specific to a single vulnerability or set of vulnerabilities
Down
- 1. Software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
- 2. Used to attack networked systems with a large volume of traffic to carry out a DoS attack
- 3. Program that installs other items on a machine that is under attack (usually sent via email)
- 4. Used to send large volumes of unwanted email
- 6. Unsolicited bulk email
- 9. A program that can run independently and can propagate a complete working version of itself onto other hosts in a network
- 10. Captures keystrokes on a compromised system
- 12. A virus that infects files with macro scripting that is interpreted by an application
- 13. Malicious hacker tools used to break into new machines remotely
- 15. A worm that exploits an unknown vulnerability this is only discovered after the worm has already launched
- 16. A virus that is disigned to hide itself from antivirus software
- 18. Malware that, when executed, tries to replicate itself into other executable code
