Across
- 4. Looking at someone's information over their shoulder.
- 6. Stimuli that has meaningful context.
- 7. software designed to interfere with a computer's normal functioning.
- 8. Inventing a scenario to engage with victim.
- 9. A person who breaks into computers to gain unauthorized access to information.
Down
- 1. malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
- 2. malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
- 3. Information that relates to an individual.
- 5. Efficient information that was translated.
