Across
- 2. Malicious code that spreads by attaching itself to files
- 3. Fake messages that try to trick you into giving personal information
- 4. Software that secretly collects user information
- 5. Extra login security requiring two forms of verification
- 9. Software designed to harm or exploit a computer or network
- 10. The process of verifying a user's identity
- 11. Software that detects and removes malware
- 12. Malware that locks files and demands payment to unlock them
- 13. A security system that blocks unauthorized access to a network
- 14. Scrambling data so only authorized users can read it
- 15. Someone who gains unauthorized access to systems
Down
- 1. The trail of information you leave online
- 6. Malware that spreads automatically without user action
- 7. A secret word used to access an account
- 8. When private information is exposed or stolen
