Across
- 1. Designed to obtain personal information without the user's permission
- 5. Company uses .... techniques to decode (or decipher) secret data
- 8. Malware that is used to pose as different software
Down
- 2. Encoding data so that unauthorized users can't read it is known as ...
- 3. Protects a company intranet from outside attacks.
- 4. Can infect your files and corrupt your hard drive
- 6. Users have to enter a ... to gain access to a network.
- 7. Person who uses their computer skills to enter computers and/or networks illegally
