Test

12345678910
Across
  1. 4. the activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. 5. any malicious computer program which is used to hack into a computer by misleading users of its true intent
  3. 6. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  4. 8. a local or restricted communications network, especially a private network created using World Wide Web software
  5. 10. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. 1. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  2. 2. are small files that Web sites put on your computer hard disk drive when you first visit
  3. 3. algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
  4. 7. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
  5. 9. a standalone malware computer program that replicates itself in order to spread to other computers