Name: __________________Period:________

1234567891011
Across
  1. 2. Codes of behavior that are sometimes, but not always, enforced by laws
  2. 5. Ongoing effort to protect networks connected to the Internet
  3. 7. A computer program that attaches itself to other executable files on the computer
  4. 8. Any code that can steal data, bypass access, or cause harm to a system
  5. 9. Design to automatically deliver advertisements to a user
  6. 10. Replicates itself to spread from one computer to another
  7. 11. A technique that allows suspicious files to be analyzed in a safe environment.
Down
  1. 1. Any information about you, a company or organization
  2. 3. An Internet-based conflict that involves the networks of other nations
  3. 4. Hardware or software that prevents hackers from accessing your data
  4. 6. A decoys to sneak malicious software past unsuspecting users
  5. 9. A program that scans a computer for malicious software and deletes it