Across
- 2. A person that wants to take files and important information
- 5. A field in IT that keeps data secured and safe
- 8. Important information that could be used to impersonate someone else
- 9. Many different forms of harmful software
- 10. A malicious Software that needs a host in order to work
- 11. A system that can be used for work, games, and to hack.
Down
- 1. Malicious software designed to imitate normal software
- 3. Undiscovered attack
- 4. Software to steal data and attempt to sell it back to the user
- 6. Raises permissions to access data
- 7. Does not need host in order to cause problems and spread