Deanna Herbert

1234567891011121314
Across
  1. 3. If you ______ your files can be saved from hackers locking them
  2. 4. Can damage networks.
  3. 6. Type of attack that floods a system with traffic (Denial of Service)
  4. 8. Is used to get information from a person's computer
  5. 10. A software used to protect your computer from a type of malware
  6. 13. Can be let into your computer by a form of communication
  7. 14. Made up of code, can be downloaded onto your computer.
Down
  1. 1. Unwanted Software that is type of malware
  2. 2. A person who may try to get into your computer
  3. 5. A ransomware that was used in an attack in Atlanta.
  4. 6. You should not ________ anything suspicious onto your computer
  5. 7. Is used to scare or cause anxiety to the user
  6. 9. Fraud Email that can be sent to you
  7. 11. Software that is meant to harm your computer.
  8. 12. A virus that acts like another virus as a disguise.