Across
- 1. self replicate without any user help meaning they can spread very quickly.
- 4. when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
- 6. Monitor user actions such as key presses and then send the information back to the hacker
- 7. emails that try to trick you into giving away personal information such as bank details
- 8. attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
- 2. malicious software. A program designed to cause harm to your computer
- 3. malware which is disguised as legitimate software
- 5. two or more devices connected together
- 6. tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed
