CYBERSECURITY
Across
- 3. When somebody steals your log in information and uses your account to ask money from your friends, it's called an _______ theft.
- 4. A person who uses computers to get unauthorized access to data.
- 7. Looks like a normal program but secretly installs malware
- 8. If you open an infected file, it can attach to your program and damage
- 11. Your name, date of birth and passport details are _________ information.
- 12. You need to install it if you want to protect your computer from viruses.
Down
- 1. Records everything you type on your keyboard.
- 2. When you _____ a film, you download it from not legal source.
- 5. Can lock all your files and ask for money to unlock them
- 6. The name for all programs that want to harm you computer.
- 9. computer.
- 10. A line of symbols, numbers and letters that must be typed to get access to an account