Across
- 3. Something to protect your personal data.
- 5. It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- 8. A malicious form of self-replicating software.
- 9. It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
- 1. It is any information relating to an identifiable person.
- 2. a person who uses computers to gain unauthorized access to data.
- 4. It is unwanted software that monitors and gathers information on a person and how they use their computer.
- 6. It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
- 7. They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
- 10. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.