Deanna Herbert
Across
- 3. If you ______ your files can be saved from hackers locking them
- 4. Can damage networks.
- 6. Type of attack that floods a system with traffic (Denial of Service)
- 8. Is used to get information from a person's computer
- 10. A software used to protect your computer from a type of malware
- 13. Can be let into your computer by a form of communication
- 14. Made up of code, can be downloaded onto your computer.
Down
- 1. Unwanted Software that is type of malware
- 2. A person who may try to get into your computer
- 5. A ransomware that was used in an attack in Atlanta.
- 6. You should not ________ anything suspicious onto your computer
- 7. Is used to scare or cause anxiety to the user
- 9. Fraud Email that can be sent to you
- 11. Software that is meant to harm your computer.
- 12. A virus that acts like another virus as a disguise.