Across
- 4. stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
- 6. a form of malware that prevents you from accessing files on your computer.
- 9. defensive technology designed to keep the hackers out.
- 10. hacking attack that tricks victims into clicking on an unintended link.
Down
- 1. data that is used to describe large amounts of other Internet data.
- 2. lure individuals into revealing login information.
- 3. hackers that break into the network to steal information that will be used to harm the owner.
- 5. false ATM cards used by criminals for their monetary benefits.
- 7. a malicious application that can be used to take advantage of a computer’s vulnerability.
- 8. program that masks something harmful,that carries it into a device.
