Internet Security

12345678910111213
Across
  1. 2. Computer criminals. Otherwise known as 'black-hat hatters'
  2. 4. Software created to damage or alter the computer data or its operations
  3. 7. An electronic way of proving your identity (2 words)
  4. 10. A self-copying program that has the capacity to move from one computer to another without human help, by exploiting security flaws
  5. 12. Software designed to collect information from computers for commercial or criminal purposes
  6. 13. Email fraud conducted for the purposes of information or identity theft
Down
  1. 1. A fraudulent or deceptive act or operation
  2. 3. To alter using a secret code so as to be unitelligible to unauthorised parties
  3. 5. A program designed to protect against viruses
  4. 6. A program designed to prevent spyware from gaining access to the internal network
  5. 8. A malicious program disguised as innocent-looking files or embedded within legitimate software. It doesn't copy itself (2 words)
  6. 9. Anonymous:noun
  7. 11. A program that spreads by attaching itself to executable files or documents
  8. 13. The unauthorised reproduction or use of copyrighted books, music etc