Across
- 3. transforms plaintext into ciphertext
- 4. key used to decrypt
- 7. trap for cyber criminals
- 9. unsolicited emails
- 11. tricked into clicking
- 13. intrusive computer software
- 16. key to encrypt and decrypt
- 17. helps prevent hackers and viruses
- 19. hidden horse surprise
- 20. malware that collects personal data
- 21. hides users location
Down
- 1. unwanted pop up ads
- 2. used to detect viruses network
- 5. program that allows remote access
- 6. person who harms your computer
- 8. protects data by scrambling it
- 10. error on software
- 12. malware that reproduces itself
- 14. ethical hacker
- 15. form of internet communication
- 18. peripherals connected as one entity.