Across
- 3. hackers use this to find out every key pressed
- 5. The act of trying to gain personal information from victims
- 9. these people perform cyber attacks
- 10. Hackers use this to watch what you are doing without having to be beside you
Down
- 1. Replicates itself to do the most damage
- 2. Plain text can be protected by turning it into ___ text
- 4. someone looking over you to find out your details
- 6. your messages can be made safer if they are_____
- 7. This malware needs human interaction to get started.
- 8. software designed to damage a computer system
