Security

12345678
Across
  1. 4. Theft, especially in a world where so many business people use smartphones to carry out their day to day jobs.
  2. 6. Any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.
  3. 8. When a virus disguises itself as another program to gain access to a computer
Down
  1. 1. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. 2. Someone who seeks and exploits weaknesses in a computer system or computer network.
  3. 3. Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details
  4. 5. Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
  5. 7. A standalone malware computer program that replicates itself in order to spread to other computers.