Across
- 4. You should regularly do this for your data/photos.
- 6. Tries to open security holes in your computer so a hacker can gain access.
- 8. Keeps track of every key you type and sends it to the hacker.
- 10. When someone gets your personal information.
- 12. Tries to trick you into telling them your passwords or financial information. Usually in an email or through phone calls.
- 14. Blocks you from accessing your files until you pay a ransom
- 15. Computer activities often leave digital...
Down
- 1. Spies on you and steals information.
- 2. Displays ads on your computer.
- 3. Reads everyone’s data that is passing through a network Usually on public WiFi
- 4. A group of computers all being controlled by a remote hacker to perform illegal activity.
- 5. Where your data is housed online, keeping it safe from hard drive failures.
- 7. Protects your computer from malware
- 9. Malicious software that spreads between files on your computer, ruining them or your computer. Replicates itself
- 11. When people steal intellectual property such as movies, music andsoftware.
- 13. Spreads through networks and emails infecting as many computers as possible.
