Part D

12345678
Across
  1. 3. Malicious software designed to harm or exploit computers
  2. 7. The process of diagnosing and fixing problems in hardware or software
  3. 8. Software that secretly collects information from a device and sends it to others
Down
  1. 1. Illegal copying or distribution of copyrighted works
  2. 2. Creations of the mind (e.g., code, music, designs) that can be legally owned
  3. 4. A program that appears useful but hides malicious code (named after the Trojan Horse)
  4. 5. Malware that encrypts or locks files and demands payment for their release
  5. 6. Legal right giving the creator control over copying and distribution