ETHICS AND SECURITY
Across
- 2. MONITORS USER USAGE AND DATAENTRY
- 3. TEXT WHICH HAS BEEN SCRAMBLED
- 4. THE SCRAMBLING/CODING OF DATA
- 6. THE USER IS TRICKED BY A FAKE URL
- 8. THE USER IS TRICKED BY A FAKE EMAIL
- 10. A SET OF BELIEFS
- 11. A IMAGE USED TO SHOW A SITE IS SECURE
- 12. USED TO MONITOR USAGE AND STORE URLS
- 15. THE UNSCRAMBLING OF DATA
- 16. A BARRIER OF PROECTION PROVIDE BY SOFTWARE/HARDWARE
- 17. PROCTECT COMPUTER BY RUNNING ALL TIME AND DAILY SCANS
Down
- 1. AN INFECTION WHICH CHANGES COMPUTER SETTINGS AND SLOWS PERFORMANCE
- 5. THIS SHOULD BE CHANGED OFTEN AND CONTAIN TEXT/NO./SYMBOLS
- 6. TO TAKE SOMEONES WORK AND CLAIM IT IS YOUR OWN
- 7. THE ENTRY OF DATA WHICH IS UNIQUE TO THE USER
- 9. A SET OF LAWS TO PROTECT ARTISTS/CREATORS
- 13. A METHOD OF SECURING DATA
- 14. SOMEONE WHO TRIES TO STEAL INFORMATION
- 18. AN INFECTION WHICH DUPLICATES ITSELF OVER AND OVER
- 19. A FORM OF PROCTION WHEN EXCHANGING INFO ONLINE