Threats to Computer Networks
Across
- 3. programs that are hidden within other files
- 5. is a type of attack used to steal data
- 6. these are programs that pretend to be legitimate and are often disguised as an email attachment
- 8. method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
Down
- 1. these are often spread through emails
- 2. the creators of most of the problems that leads to inconvenience
- 4. programs that attempt to blackmail a user in an attempt to make a payment to a hacker
- 7. programs that monitor users activities and send information to hacks