Cyber Awareness Puzzle

12345678910111213
Across
  1. 5. When raw data is put into context and has meaning, the data transforms into ...
  2. 8. A type of malware that records every single press of the keyboard that you make.
  3. 9. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
  4. 10. The IT ... 2000 is the law used to prosecute cybercrime in India
  5. 12. link designed to steal personal information.
  6. 13. Settings on folders or files that control who is allowed to access them.
Down
  1. 1. I am not a robot.
  2. 2. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
  3. 3. Gaining unauthorised access to or control of a computer system.
  4. 4. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  5. 6. Malicious code intended to monitor your activity without your permission.
  6. 7. An email that contains a message with a
  7. 11. A malicious code typically disguised as a legitimate program.