Cybersecurity (LRM Adv Unit 10 Listening task 2/155)

12345678910111213141516
Across
  1. 4. an animal that is kept in the home as a companion and treated kindly
  2. 7. data that is _ needs to be dealt with very carefully, because it is secret
  3. 9. very silly or unreasonable
  4. 12. a container for making and serving tea with a handle and a shaped opening for pouring
  5. 14. not needed or wanted
  6. 15. a person who has a first degree from a university or college
  7. 16. Your digital _ is the collection of information generated by your online activity, e.g. your username, search history, list of contacts or purchase history.
Down
  1. 1. someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
  2. 2. to remove something that has been written down or stored in a computer
  3. 3. an object or machine that has been invented for a particular purpose
  4. 5. a secret word or combination of letters or numbers, used for communicating with a computer to prove who you are
  5. 6. If something “is of _ interest to programmers”, they are especially interested in it.
  6. 8. _ computing is a way of using computers in which you use software or storage space that is on the Internet rather than on your own computer
  7. 10. information in an electronic form that can be stored and used by a computer
  8. 11. Identity _ occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  9. 13. to make known or show something that was previously secret