Across
- 3. plan b
- 6. strong layer
- 7. secret code
- 8. mulitple unwanted text
- 10. cameras everywhere
- 13. unauthroized user
- 14. duplicating virus
- 15. linked together
Down
- 1. weakness in system
- 2. black mail
- 4. revealiing personal information
- 5. file spread
- 9. auto download
- 11. malicious software
- 12. bad virus
