CYBER LAW

12345678910
Across
  1. 4. stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
  2. 6. a form of malware that prevents you from accessing files on your computer.
  3. 9. defensive technology designed to keep the hackers out.
  4. 10. hacking attack that tricks victims into clicking on an unintended link.
Down
  1. 1. data that is used to describe large amounts of other Internet data.
  2. 2. lure individuals into revealing login information.
  3. 3. hackers that break into the network to steal information that will be used to harm the owner.
  4. 5. false ATM cards used by criminals for their monetary benefits.
  5. 7. a malicious application that can be used to take advantage of a computer’s vulnerability.
  6. 8. program that masks something harmful,that carries it into a device.