Across
- 2. floods the end users computer with unwanted advertising
- 6. the act of gaining unauthorised illegal access to a computer system
- 10. legitimate looking emails sent to fool target users into giving their personal data
Down
- 1. malicious programs disguised as some legitimate useful software
- 3. viruses that spread to other computers and corrupt the whole network without need for an active host program.
- 4. a program that encrypts users data and holds the data hostage until ransom money is paid
- 5. a Voicemail message sent to trick users into giving away sensitive data
- 7. a malicious program that can monitor users keyboard activity and gain sensitive data
- 8. malicious programs that enter users computer without their knowledge and get installed ,
- 9. program code that replicates with the intention of deleting or corrupting files aur causing computer malfunction
