Across
- 3. software designed to collect information from computers for commercial or criminal purposes
- 6. black-hat hackers
- 7. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 9. a program designed to prevent spyware from gaining access to the internal network.
- 10. horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
- 1. a deceptive scheme or trick used to cheat someone out of something, especially money
- 2. the illegal copying and distribution of copyrighted software, information, music and video files
- 4. self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
- 5. programs that spread by attaching themselves to executable files or documents
- 8. certificate an electronic way of proving your identity, when you are doing business on the Internet
