Across
- 2. - A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- 3. functions by spying on user activity without their knowledge
- 6. When a hacker exploits a vulnerability in a computer or device, gaining access to files and network
- 7. malware that deliberately prevents you from accessing files on your computer -- holding your data hostage
- 8. performs a task on command to take complete control remotely of an affected computer
- 10. When a hacker gains remote access via a “back door”
Down
- 1. Computer programs that are intended to cause harm or damage your computer
- 2. Malware used to corrupt, erase, or modify information on a computer before spreading to others
- 4. A malicious application or script that can be used to take advantage of a computer’s vulnerability
- 5. Hardware of software technology used to prevent hackers from accessing sensitive information
- 7. Malware allowing cybercriminals to remotely control your computer
- 9. Malware that can replicate itself
