Browsing Safely
Across
- 4. is a two-step authentication for login involves
- 5. is the process ‘befriending’ children on social media to facilitate online or physical sexual abuse
- 10. is a collection of of technologies,processes,and practices designed to protect network
- 12. refers to the act of stealing and misusing someone’s personal information
- 14. extract confidential information from users and use this information to execute fraudulent tasks online
- 15. spoofing means hoaxing or misleading
Down
- 1. It is an act of sending an email to a user misleading him to believe that it is from a trusted person
- 2. is an act of harming or harassing an individual using information technology in a deliberate manner
- 3. is the use of illegal methods to get money or other things that belong to a bank
- 6. is a two-step authentication for login involves
- 7. is any criminal activity intended to harm anyone using a computer
- 8. is a software that helps in preventing unauthorised access to your computer
- 9. is a computer program that is designed to identify, prevent and remove viruses from a computer
- 11. vital information resource under seize
- 13. refers to an illegal entry into a computer