Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private combination of characters associated with the user destroyed name 4. Unauthorized and illegal duplication of copyrighted software 3. Demands payment to stop an attack on an organization's 5. Useful to record, save, and execute keystrokes and instructions technology infrastructure repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up window on 9. Private combination of words associated with a user name webpages 10. Compromised computers connected to a network and used to 8. Program that copies itself repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file that a web server stores on your computer 13. Technique used to make network or Internet transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16. Compromised computer or device 15. The encrypted (scrambled) data in the encryption process 17. Program that hides in a computer and allows someone to take control of it 18. Destructive event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the encryption process.