Across
- 3. enables unauthorized users to gain access to your computer w/o being detected.
- 5. unwanted software that disguises itself as an advertisement.
- 6. duplicates itself by infecting other computers on the same network.
- 7. invades your computer and attempts to steal your personal information.
Down
- 1. records every keystroke you make.
- 2. disguises itself as legitimate software and tries to trick you into executing malicious software on your computer.
- 4. is designed to encrypt your files and block access to them until a ransom is paid.
