|
|
2
|
You would do this to make a secret message
|
4
|
The man who cracked Enigma in WW2
|
5
|
A program that clones itself to slow down software
|
7
|
Malware that is disguised as a harmless file
|
8
|
Gaining personal information without the victim knowing
|
9
|
A key is needed to do this
|
|
|
|
|
1
|
Malware that looks for holes in a system to attack it
|
3
|
The machine that cracked Enigma in WW2
|
6
|
Used to make programs
|
|
|