Threats to Computer Networks

12345678
Across
  1. 3. programs that are hidden within other files
  2. 5. is a type of attack used to steal data
  3. 6. these are programs that pretend to be legitimate and are often disguised as an email attachment
  4. 8. method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
Down
  1. 1. these are often spread through emails
  2. 2. the creators of most of the problems that leads to inconvenience
  3. 4. programs that attempt to blackmail a user in an attempt to make a payment to a hacker
  4. 7. programs that monitor users activities and send information to hacks