ETHICS AND SECURITY

12345678910111213141516171819
Across
  1. 2. MONITORS USER USAGE AND DATAENTRY
  2. 3. TEXT WHICH HAS BEEN SCRAMBLED
  3. 4. THE SCRAMBLING/CODING OF DATA
  4. 6. THE USER IS TRICKED BY A FAKE URL
  5. 8. THE USER IS TRICKED BY A FAKE EMAIL
  6. 10. A SET OF BELIEFS
  7. 11. A IMAGE USED TO SHOW A SITE IS SECURE
  8. 12. USED TO MONITOR USAGE AND STORE URLS
  9. 15. THE UNSCRAMBLING OF DATA
  10. 16. A BARRIER OF PROECTION PROVIDE BY SOFTWARE/HARDWARE
  11. 17. PROCTECT COMPUTER BY RUNNING ALL TIME AND DAILY SCANS
Down
  1. 1. AN INFECTION WHICH CHANGES COMPUTER SETTINGS AND SLOWS PERFORMANCE
  2. 5. THIS SHOULD BE CHANGED OFTEN AND CONTAIN TEXT/NO./SYMBOLS
  3. 6. TO TAKE SOMEONES WORK AND CLAIM IT IS YOUR OWN
  4. 7. THE ENTRY OF DATA WHICH IS UNIQUE TO THE USER
  5. 9. A SET OF LAWS TO PROTECT ARTISTS/CREATORS
  6. 13. A METHOD OF SECURING DATA
  7. 14. SOMEONE WHO TRIES TO STEAL INFORMATION
  8. 18. AN INFECTION WHICH DUPLICATES ITSELF OVER AND OVER
  9. 19. A FORM OF PROCTION WHEN EXCHANGING INFO ONLINE