cyber security

123456789
Across
  1. 4. Looking at someone's information over their shoulder.
  2. 6. Stimuli that has meaningful context.
  3. 7. software designed to interfere with a computer's normal functioning.
  4. 8. Inventing a scenario to engage with victim.
  5. 9. A person who breaks into computers to gain unauthorized access to information.
Down
  1. 1. malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
  2. 2. malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
  3. 3. Information that relates to an individual.
  4. 5. Efficient information that was translated.