Across
- 4. Malicious code that attaches to files and spreads when opened.
- 8. Malware disguised as legitimate software.
- 9. Deliberate destruction or disruption of systems.
- 10. Tool that records every keystroke made by a user.
- 11. Fake alerts designed to trick users into downloading malware.
- 12. Software that hides the existence of malware.
- 13. Intercepting data packets on a network.
- 14. Publishing private information about someone online.
Down
- 1. Fraudulent attempt to obtain sensitive information via email.
- 2. Software that secretly monitors user activity.
- 3. Network of infected devices controlled remotely.
- 5. Malware that encrypts data and demands payment.
- 6. Self-replicating malware that spreads across networks.
- 7. Hidden method of bypassing normal authentication.
- 11. Impersonating another device or user to gain access.
