Cybersecurity & Internet
Across
- 3. A fraudulent attempt to obtain sensitive information via the internet.
- 5. A structured set of data held in a computer.
- 7. A form of bullying that occurs online.
- 10. The act of stealing someone’s personal information for malicious purposes.
- 11. A global network connecting millions of computers.
- 12. Software designed to harm or exploit devices.
- 13. The amount of data that can be transmitted in a fixed amount of time.
- 15. The correct or acceptable way of communicating on the internet.
- 17. A system designed to prevent unauthorized access to or from a network.
- 19. A protocol used to transfer data over the internet.
- 20. Individuals who exploit the internet to harm others.
- 22. A unique identifier in a database.
Down
- 1. The use of the internet to stalk or harass someone.
- 2. Software used to manage and organize databases.
- 4. Increased capacity for data transfer.
- 6. A password that is difficult for others to guess or crack.
- 8. A device that forwards data packets between computer networks.
- 9. A unique string of numbers assigned to each device on a network.
- 14. Reduced capacity for data transfer.
- 16. The trail of data that individuals leave when using the internet.
- 18. The system that translates domain names into IP addresses.
- 21. Illegal activities that involve computers or networks.