Across
- 3. A method of hiding malicious code in legitimate files.
- 6. A software that secretly gathers user information without consent.
- 8. A program that allows unauthorized remote access.
- 9. A network of infected devices controlled remotely by hackers
- 11. A program that appears legitimate but contains harmful code.
Down
- 1. A software that secretly records keystrokes.
- 2. A malicious software that locks files and demands a ransom.
- 4. A type of malware that spreads by copying itself.
- 5. A malware designed to hide its presence and maintain privileged access.
- 7. A type of cyber attack where fake emails trick users.
- 10. A cyber attack that floods a network to disrupt services.
