Across
- 4. This method scrambles data so that only authorized people can read it
- 5. the practice of keeping computer systems safe
- 8. a hacker sneaks in between two people who are communicating
- 9. acts like a barrier between your computer and the internet
Down
- 1. harmful software that can damage your computer
- 2. Software detect and remove harmful software
- 3. attackers send fake emails
- 6. uses malware to lock your files so you can’t access them
- 7. Injection when attackers take advantage of weaknesses in websites