Across
- 3. Unwanted or unsolicited email often used to distribute malware.
- 6. A scam where attackers impersonate senior executives.
- 8. Type of malware that locks files and demands payment to unlock them.
- 9. Keeping your software and operating system ________ is a key part of security.
Down
- 1. Software that secretly gathers information from a computer.
- 2. A common method used by cybercriminals to trick users into revealing sensitive information.
- 4. A software program designed to protect against viruses and malware.
- 5. A criminal who uses computers and networks to commit crimes.
- 7. A secret word or phrase used to access a system.
