Cyber security

123456789101112131415161718
Across
  1. 3. Desktop is also known as.
  2. 6. Hiding one piece of data with in another.
  3. 7. The crime that related to computers and networks.
  4. 12. A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
  5. 13. Secretly watches computer activity.
  6. 14. Phishing is malware that asks for ______ details.
  7. 17. Any program, website, or file that is defined to damage or gain unauthorized access to a device.
  8. 18. The practice of protecting systems, networks and programs from digital attacks.
Down
  1. 1. Someone who breaks into a computer system.
  2. 2. URLs that mislead the user into down leading a virus and visiting a harmful website.
  3. 4. Illegal production of copyrighted material is often referred as ____.
  4. 5. Information is also known as.
  5. 8. A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
  6. 9. Type of bullying that takes place online.
  7. 10. ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
  8. 11. An online threat that hides itself in computers and mobile device.
  9. 15. Software that protects computer from virus related harm.
  10. 16. Copying the data without the permission of owner of the computer/computers system/ computer network.