Cybersecurity
Across
- 2. a set of instructions, data or programs
- 3. traceroute protocol
- 5. malware demanding a ransom
- 7. a person doing hack legally
Down
- 1. encrypt information to ensure confidentiality
- 4. malware masked by genuine software
- 6. known to its sole owner and used by him alone to decipher a message of which he is the recipient
- 8. Computer spying device that records the sequences of keys typed on a keyboard.