Malware

12345678
Across
  1. 2. Unsolicited software designed to work off of your CPU's processing power
  2. 3. A phoney device that overlays a valid card reader
  3. 6. An attack method meant to interrupt network activity
  4. 7. An email seeks to gain something from the user
  5. 8. Ssoftware that blocks malicious programs from running
Down
  1. 1. Malicious code that disrupts normal computer functions
  2. 4. Software that will record your keyboard actions
  3. 5. A virus that will encrypt your files and demand payment