Across
- 3. Blocks you from accessing your files until you pay a ransom.
- 4. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- 7. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- 8. Spies on you, stealing information like passwords and credit card numbers
- 9. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- 11. Keeps track of every key you type and sends it to the hacker.
- 12. Something used to protect Against Viruses
- 14. Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
- 1. Displays ads on your computer. May slow down your computer
- 2. IF someone is completely _______ they cant be traced.
- 5. When someone gets your personal info and then does things pretending to be you.
- 6. Spreads through networks and emails infecting as many computers as possible. Get it through email.
- 10. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- 13. A group of computers all being controlled by a remote hacker to perform illegal activity.
