Across
- 1. These threats can compromise security by tricking users into revealing sensitive information
- 3. A legal right protecting original creative works
- 5. malicious program that is disguised as a useful program
- 7. most well-known type of malware
- 8. designed to disrupt, damage, or gain unauthorized access to computer
- 10. records all the user’s keystrokes on the keyboard
- 11. a legal doctrine allowing limited use of copyrighted material without permission for purposes like criticism, commentary, news reporting, teaching, scholarship, or research
Down
- 1. collects information about your online habits, passwords, and personal details
- 2. It can be achieved by installing malicious code on a victim's computer or by manipulating DNS
- 3. a crime committed or assisted through the use of the Internet
- 4. is a type of cybercrime where attackers impersonate a trustworthy entity
- 6. bombards you with unwanted advertisements
- 9. malicious program that transfers from one computer to another
