Across
- 3. gain unauthorized access to a computer system
- 4. capable of being easily hurt
- 6. refers to any external entity who may have access to private data
- 8. security risk who cause the program to crash
- 9. network of maliciously installed bots
- 10. records or transmits a user's keystrokes
Down
- 1. cyber exploit directed at online card players
- 2. unauthorized duplication or deletion of an organization's electronic information
- 5. security mechanism for separating running programs
- 7. software tools used by a third party
