Across
- 2. Malicious software that infects a user's computer and changes how is operates
- 3. User's data is held hostage until a payment is made
- 6. Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
- 7. Hidden software that records a user's information secretly for a third-party
- 8. The practice of protecting internet-connected systems from digital attacks
- 9. A an email disguised as a legitimate source that tricks users into offering up personal information
Down
- 1. Is protecting of information from malicious damage and unauthorized access
- 4. A kind of software used to prevent, scan, detect and delete viruses from a computer
- 5. A form of malware that is self-replicating infecting a computer and can spread across its network