Browsing Safely

123456789101112131415
Across
  1. 4. is a two-step authentication for login involves
  2. 5. is the process ‘befriending’ children on social media to facilitate online or physical sexual abuse
  3. 10. is a collection of of technologies,processes,and practices designed to protect network
  4. 12. refers to the act of stealing and misusing someone’s personal information
  5. 14. extract confidential information from users and use this information to execute fraudulent tasks online
  6. 15. spoofing means hoaxing or misleading
Down
  1. 1. It is an act of sending an email to a user misleading him to believe that it is from a trusted person
  2. 2. is an act of harming or harassing an individual using information technology in a deliberate manner
  3. 3. is the use of illegal methods to get money or other things that belong to a bank
  4. 6. is a two-step authentication for login involves
  5. 7. is any criminal activity intended to harm anyone using a computer
  6. 8. is a software that helps in preventing unauthorised access to your computer
  7. 9. is a computer program that is designed to identify, prevent and remove viruses from a computer
  8. 11. vital information resource under seize
  9. 13. refers to an illegal entry into a computer