Across
- 2. malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
- 6. connects a series of computers and devices in a private encrypted network
- 7. used to protect your information from hackers.
- 8. A form of malware used by hackers to spy on you and your computer activities
- 9. A scam where a hacker poses as a legitimate business
Down
- 1. Ransomware, worms, viruses, and trojans are all considered this
- 3. identifying a user’s identity
- 4. software or hardware used to keep intruders out
- 5. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
- 10. a person who uses computers to gain unauthorized access to data.
