Unit 11 crossword

1234567891011121314
Across
  1. 2. Standalone malicious programs that self-replicate and spread across networks.
  2. 4. Malicious code that attaches to legitimate programs and spreads.
  3. 6. Scrambling data to make it unreadable without a key.
  4. 7. Software that secretly monitors and collects information about a user.
  5. 8. An attacker secretly intercepting communication between two parties.
  6. 9. Any software designed to harm or exploit a computer system.
  7. 11. : A hacker who finds vulnerabilities without permission but usually reports them.
  8. 14. :Manipulating people to gain access to information or systems.
Down
  1. 1. : A malicious hacker who breaks into systems illegally for personal gain or damage.
  2. 2. : An ethical hacker who finds vulnerabilities with permission.
  3. 3. attack: Malicious software that blocks access to data until a fee is paid.
  4. 5. Tricking people into revealing sensitive information, often via fake emails.
  5. 10. : A novice hacker, often trying to learn and gain recognition.
  6. 12. : Hackers who aggressively shut down black hat hackers (e.g., vigilantes).
  7. 13. Malicious programs disguised as legitimate software to gain access