Across
- 2. a person who uses computers to gain unauthorized access to data.
- 4. is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
- 6. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- 9. a type of malicious software designed to block access to a computer system until a sum of money is paid.
- 10. a small rodent that typically has a pointed snout, relatively large ears and eyes, and a long tail.
- 12. make (a coded or unclear message) intelligible.
- 13. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
- 14. software that is available free of charge.
Down
- 1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- 3. a panel of keys that operate a computer or typewriter.
- 5. is a type of malware that is often disguised as legitimate software.
- 6. commercial transactions conducted electronically on the Internet.
- 7. the practice of obtaining something, especially money, through force or threats.
- 8. are malicious programs that make copies of themselves again and again on the local drive, network shares, etc.
- 11. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
