Network security

12345678910
Across
  1. 3. Used to disrupt, damage or gain unauthorized access to a computer system
  2. 5. The gap between regions and demographics that have access to modern technology
  3. 7. Attempting to gain sensitive information using emails
  4. 8. Used to supress ideas on the internet
  5. 10. Monitoring of data being transferred over computer networks
Down
  1. 1. Malware that can self-replicate causing them to spread more rapidly
  2. 2. Malware that spreads by copying infected files and activates when opening infected files
  3. 4. The process of converting information into a line of code
  4. 6. Malware disguised as legitimate software
  5. 9. Two or more computers that are connected together for the purpose of communication