Cybersecurity Essentials
Across
- 2. monitors your online activity and can log every key you press
- 4. a computer program that replicates and attaches to files
- 6. holds data until it makes a payment
- 7. a program that scans a computer for malicious software and deletes it
- 8. replicates itself to spread from one computer to another
- 10. a decoy to sneak malicious software past unsuspecting users
Down
- 1. hackers who are self-employed or working for large crime organization
- 3. hardware or software that prevents hackers from accessing your personal data
- 5. converting information into a form where an unauthorized people cannot read it
- 9. any code that can steal data or cause harm to a system