Malicious Software - CAT

Edit Answers
PIXFXINHKRSSRNBDWMFG THNLAMOSCKTHGIPCJUBZ UMQAFATQQGXNYPEHQTEN YRIMOLEMKNWGSHMGCGTQ HMMIZWUKRIUNTNIKXZET ZOYNQAZNRHFIIHRCFRNH JMTGPRKLMSLTEECSLZTU NLDEPEASXIQTBDRQZCOB HTLORHJPAHVAAREDXYBZ XNKGXMDYOPCUXDBVCBMH PXBNXQFWHWPQGRYIBEYC WIKISKJASBXSYECRTROU LARLLJYRVOSRGGKUUBNK GDTAADNEPKKELGWSXUUP BDBHCUXUPXQBVOOQWLGY YOEWWYUXEIDYTLRXGLPE XSOBARNACLECXYMTXYBQ NGMJKXWPICFQUEQOTIGO JXGHSWADGZAGYKRSYNHZ XDECLICKBAITIDMTAGUY
1.
Type of unwanted software
2.
legitimate software that monitors your online activity
3.
A large network of compromised computers
4.
criminal activities involving computers and the internet
5.
posting offensive content online with the intent to cause arguments
6.
software that detects keystrokes and mouse clicks on your computer
7.
harmful software designed to spread from one computer to another
8.
distribution of a story that is not true on social media sites
9.
Use of software without purchasing it
10.
unwanted program installed with a downloaded application without users consent or knowledge
11.
Self-replicating program found on a network. Sends copies of itself to other computers on the same network
12.
When a number of infected computers perform simultaneous requests on the same website to overwhelm the server to the point of crashing it
13.
Gathering someone's personal details through the use of convincing emails and short messages
14.
Evocative text or shocking imagery encouraging you to click on it.
15.
Ongoing harassment, ridiculing or threatening messages on electronic devices
16.
registering a domain name without the actual intent to use the domain
17.
Gathering information about a person in a position of power