Cybersecurity

12345678
Across
  1. 2. a set of instructions, data or programs
  2. 3. traceroute protocol
  3. 5. malware demanding a ransom
  4. 7. a person doing hack legally
Down
  1. 1. encrypt information to ensure confidentiality
  2. 4. malware masked by genuine software
  3. 6. known to its sole owner and used by him alone to decipher a message of which he is the recipient
  4. 8. Computer spying device that records the sequences of keys typed on a keyboard.