CYBER SECURITY
Across
- 2. attempt to acquire sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
- 4. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
- 1. never respond to unusual___.
- 2. never give your ___ information online.
- 3. bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.