answer question
Across
- 1. Logical errors on software are also called…
- 6. Malware which exploits weaknesses in an application or operating system in order to spread.
- 8. A collection of programs designed to infiltrate a computer and gain the highest level of privileges to take control of the infected computer.
- 9. Example of social engineering via e-mail, cell phone or malware to receive user confidential data like passwords to commit identity theft.
- 10. Form of malware with file extension ‘.exe’ =
Down
- 2. Keyloggers, which record keystrokes as you type and possibly the movements of your mouse in order to gain access to your data fall under which type of malware
- 3. This principle states that if incorrect data has been input, the computer won’t sort it out
- 4. Data is _____________ when storage devices such as hard drives and flash drives fail, making it impossible to access data.
- 5. Social networks are prone to social engineering attacks. like a user talking to someone posing as someone else and giving out personal information?
- 7. What kind of software secretly installs itself to affect or harm computer software?