Across
- 2. A set of tools used by hackers to gain administrative access to a computer while remaining hidden.
- 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules
- 7. Malware that encrypts a victim's files and demands payment to restore access
- 8. Software that secretly gathers user information through the user's Internet connection without their knowledge.
- 10. A network of infected computers controlled remotely by cybercriminals to perform tasks such as sending spam or launching attacks.
Down
- 1. Malicious software that records keystrokes made by a user, capturing sensitive information like passwords.
- 3. Unwanted software that automatically displays advertisements on a user's screen.
- 4. A malicious program designed to replicate itself and spread to other computers without user permission.
- 5. Any software intentionally designed to cause damage to a computer, server, client, or computer network.
- 9. A self-replicating malware that spreads over networks, often causing harm to systems.
