CYBER

12345678910
Across
  1. 2. malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
  2. 6. connects a series of computers and devices in a private encrypted network
  3. 7. used to protect your information from hackers.
  4. 8. A form of malware used by hackers to spy on you and your computer activities
  5. 9. A scam where a hacker poses as a legitimate business
Down
  1. 1. Ransomware, worms, viruses, and trojans are all considered this
  2. 3. identifying a user’s identity
  3. 4. software or hardware used to keep intruders out
  4. 5. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
  5. 10. a person who uses computers to gain unauthorized access to data.