answer question

12345678910
Across
  1. 1. Logical errors on software are also called…
  2. 6. Malware which exploits weaknesses in an application or operating system in order to spread.
  3. 8. A collection of programs designed to infiltrate a computer and gain the highest level of privileges to take control of the infected computer.
  4. 9. Example of social engineering via e-mail, cell phone or malware to receive user confidential data like passwords to commit identity theft.
  5. 10. Form of malware with file extension ‘.exe’ =
Down
  1. 2. Keyloggers, which record keystrokes as you type and possibly the movements of your mouse in order to gain access to your data fall under which type of malware
  2. 3. This principle states that if incorrect data has been input, the computer won’t sort it out
  3. 4. Data is _____________ when storage devices such as hard drives and flash drives fail, making it impossible to access data.
  4. 5. Social networks are prone to social engineering attacks. like a user talking to someone posing as someone else and giving out personal information?
  5. 7. What kind of software secretly installs itself to affect or harm computer software?