Y8 Security

12345678
Across
  1. 1. self replicate without any user help meaning they can spread very quickly.
  2. 4. when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
  3. 6. Monitor user actions such as key presses and then send the information back to the hacker
  4. 7. emails that try to trick you into giving away personal information such as bank details
  5. 8. attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
  1. 2. malicious software. A program designed to cause harm to your computer
  2. 3. malware which is disguised as legitimate software
  3. 5. two or more devices connected together
  4. 6. tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed