Internet security

12345678
Across
  1. 1. Designed to obtain personal information without the user's permission
  2. 5. Company uses .... techniques to decode (or decipher) secret data
  3. 8. Malware that is used to pose as different software
Down
  1. 2. Encoding data so that unauthorized users can't read it is known as ...
  2. 3. Protects a company intranet from outside attacks.
  3. 4. Can infect your files and corrupt your hard drive
  4. 6. Users have to enter a ... to gain access to a network.
  5. 7. Person who uses their computer skills to enter computers and/or networks illegally