E-safety

123456789101112131415161718192021
Across
  1. 3. there is no known way to replicate it
  2. 5. unique characteristics of human beings
  3. 9. When a message undergoes encryption it becomes
  4. 12. makes the data meaningless
  5. 14. avoid the need to utilise so much computer time for each connection
  6. 18. legitimate-looking emails
  7. 19. log all incoming and outgoing traffic
  8. 20. internet is an _______ forum
  9. 21. junk email
Down
  1. 1. gathers data by monitoring key presses
  2. 2. gaining unauthorised access to a computer system
  3. 4. compares patterns of ‘ridges’ and ‘valleys'
  4. 6. uses short message service system of mobile phones to send out fake text messages
  5. 7. redirect the user to a fake website without their knowledge
  6. 8. software that can replicate/copy itself with the intention of deleting or corrupting files on a computer
  7. 10. found on a digital certificate
  8. 11. refers to any data concerning a living person who can be identified either from the data itself or from the data in conjunction with other information
  9. 13. voice mail message to trick the user into calling a telephone number
  10. 15. a small look-up table containing pairs of values
  11. 16. refers to safety when using the internet
  12. 17. allows data to be sent and received securely over the internet