Across
- 1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 4. is a network of computers whose access has been compromised, and that are controlled remotely.
- 5. all information processed by computer systems, programs and data.
- 7. software that causes advertisements to be displayed on a computer's desktop or in a web browser, in order to generate income from these ads being shown.
- 10. type of malware that locks a computer or hijacks a user's files until a ransom is paid.
- 11. type of malware that records all keystrokes that a user types on their computer.
- 12. is what malicious users leverage to take advantage of vulnerabilities
- 14. is a standalone malware computer program that replicates itself in order to spread to other computers.
Down
- 2. type of malware that records all keystrokes that a user types on their computer.
- 3. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 6. a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- 8. attack uses multiple computers and Internet connections to flood the targeted resource.
- 9. a way to access a computer or device without authentication.
- 12. messages distributed by electronic means from one computer user to one or more recipients via a network.
- 13. is malicious software that spies on a user, recording keystrokes (i.e. keylogger), such as user names and passwords, tracking user activity on the internet, or activating the microphone or camera on a computer to record physical activity.