Across
- 5. your files become encrypted.
- 6. gathers information on a person and how they use their computer.
- 7. infects your computer through email spam or instant text messages.
Down
- 1. whether you are online or offline, it will display pop-ups or ads.
- 2. appears as a useful or fun application (like a new game) where the hacker can use the game to perform malicious actions on your computer.
- 3. needs to be downloaded as a part of another file to infect your computer.
- 4. used to verify who is entering the account and is used to secure your account from hackers.