Across
- 4. protocol for securing internet communications
- 5. malware that watch your online activities without you knowing
- 6. type of attack that involves trying all possibilities to find a password or codes
- 8. design flaw in a computer program
- 9. encrypt messages with keys
Down
- 1. weakness in a computer system allowing an attacker to harm the integrity of that system
- 2. check the data flows and what types of communications are allowed on a computer network.
- 3. computer attack that aims to obtain personal data by relying on identity theft
- 7. block access to the computer or files and demand payment