Cybersecurity Essentials

12345678910
Across
  1. 2. monitors your online activity and can log every key you press
  2. 4. a computer program that replicates and attaches to files
  3. 6. holds data until it makes a payment
  4. 7. a program that scans a computer for malicious software and deletes it
  5. 8. replicates itself to spread from one computer to another
  6. 10. a decoy to sneak malicious software past unsuspecting users
Down
  1. 1. hackers who are self-employed or working for large crime organization
  2. 3. hardware or software that prevents hackers from accessing your personal data
  3. 5. converting information into a form where an unauthorized people cannot read it
  4. 9. any code that can steal data or cause harm to a system