Cybersecurity (LRM Adv Unit 10 Listening task 2/155)
Across
- 4. an animal that is kept in the home as a companion and treated kindly
- 7. data that is _ needs to be dealt with very carefully, because it is secret
- 9. very silly or unreasonable
- 12. a container for making and serving tea with a handle and a shaped opening for pouring
- 14. not needed or wanted
- 15. a person who has a first degree from a university or college
- 16. Your digital _ is the collection of information generated by your online activity, e.g. your username, search history, list of contacts or purchase history.
Down
- 1. someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
- 2. to remove something that has been written down or stored in a computer
- 3. an object or machine that has been invented for a particular purpose
- 5. a secret word or combination of letters or numbers, used for communicating with a computer to prove who you are
- 6. If something “is of _ interest to programmers”, they are especially interested in it.
- 8. _ computing is a way of using computers in which you use software or storage space that is on the Internet rather than on your own computer
- 10. information in an electronic form that can be stored and used by a computer
- 11. Identity _ occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- 13. to make known or show something that was previously secret