cyber sceurity
Across
- 3. A person who breaks into systems to cause harm or steal data.
- 4. Transforming information to hide its meaning.
- 6. Deceptive activities to gain money or personal information illegally.
- 7. A small file that stores user data in the browser.
- 9. Illegal copying or sharing of software.
- 10. Unwanted bulk emails sent to many people.
- 13. The unique ID every device has on a network.
- 14. Ethical rules to follow while using the internet.
- 18. A system that filters network traffic for safety.
- 19. Unethical act of harassing someone online.
- 20. Ethical use of technology and internet.
Down
- 1. A malicious trick where users click on invisible or disguised elements.
- 2. A legal right that protects original digital works.
- 5. Copying someone’s work and claiming it as your own.
- 8. Secret word used to access an account.
- 11. The online record you leave behind.
- 12. Fake websites or emails used to trick users.
- 15. A malicious program that spreads by itself.
- 16. A person who breaks into systems.
- 17. The act of accessing a system without permission.