Network security
Across
- 3. Used to disrupt, damage or gain unauthorized access to a computer system
- 5. The gap between regions and demographics that have access to modern technology
- 7. Attempting to gain sensitive information using emails
- 8. Used to supress ideas on the internet
- 10. Monitoring of data being transferred over computer networks
Down
- 1. Malware that can self-replicate causing them to spread more rapidly
- 2. Malware that spreads by copying infected files and activates when opening infected files
- 4. The process of converting information into a line of code
- 6. Malware disguised as legitimate software
- 9. Two or more computers that are connected together for the purpose of communication