Security
Across
- 4. Theft, especially in a world where so many business people use smartphones to carry out their day to day jobs.
- 6. Any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.
- 8. When a virus disguises itself as another program to gain access to a computer
Down
- 1. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 2. Someone who seeks and exploits weaknesses in a computer system or computer network.
- 3. Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details
- 5. Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- 7. A standalone malware computer program that replicates itself in order to spread to other computers.