Seminar 5 Crossword

12345678910111213141516171819
Across
  1. 5. A virus that mutates with every infection, making detection by the "signature" of the virus impossible
  2. 7. A program inserted into software by an intruder and lies dormant until a predefined condition is met
  3. 8. Advertising that is integrated into software
  4. 11. Malware that encrypts the user's data and demand payment in order to access the key needed to recover the information
  5. 14. Any mechanism that bypasses a normal security check
  6. 15. Program activated on an infected machine that is activated to launch attacks on other machines
  7. 17. Set of hacker tools used after the attacker has broken into a computer system and gained root-level access
  8. 19. Code specific to a single vulnerability or set of vulnerabilities
Down
  1. 1. Software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
  2. 2. Used to attack networked systems with a large volume of traffic to carry out a DoS attack
  3. 3. Program that installs other items on a machine that is under attack (usually sent via email)
  4. 4. Used to send large volumes of unwanted email
  5. 6. Unsolicited bulk email
  6. 9. A program that can run independently and can propagate a complete working version of itself onto other hosts in a network
  7. 10. Captures keystrokes on a compromised system
  8. 12. A virus that infects files with macro scripting that is interpreted by an application
  9. 13. Malicious hacker tools used to break into new machines remotely
  10. 15. A worm that exploits an unknown vulnerability this is only discovered after the worm has already launched
  11. 16. A virus that is disigned to hide itself from antivirus software
  12. 18. Malware that, when executed, tries to replicate itself into other executable code