Across
- 1. GETTING PASSWORDS FOR ONLINE BANK ACCOUNTS BY FAKE BANK EMAIL
- 3. IAN MURPHY ______ INTO THE WHITE HOUSE
- 6. ONLINE HARASSMENT
- 7. PROGRAM WRITTEN BY PHIL ZIMMERMAN
- 8. THE MOST COMMON METHOD OF PROTECTION
- 9. THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE
Down
- 1. PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN
- 2. SMALL FILES PLACED ON YOUR HARD DRIVE
- 3. WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN?
- 4. PROGRAMS THAT DAMAGE YOUR COMPUTER?
- 5. PROCESS OF CONVERTING INFORMATION OR DATA INTO A CODE
