Across
- 2. Unsolicited software designed to work off of your CPU's processing power
- 3. A phoney device that overlays a valid card reader
- 6. An attack method meant to interrupt network activity
- 7. An email seeks to gain something from the user
- 8. Ssoftware that blocks malicious programs from running
Down
- 1. Malicious code that disrupts normal computer functions
- 4. Software that will record your keyboard actions
- 5. A virus that will encrypt your files and demand payment
