Internet Safety, Cyber Security and Encryption: Digital Footprint

12345678910
Across
  1. 2. is when you tricking someone into giving their password.
  2. 7. is when a hacker uses a program that tries every possible combination to identify your password.
  3. 8. the email if you are not sure whether the email is genuine.
  4. 10. is the term use for unauthorize access
Down
  1. 1. is the common method to login to your account
  2. 3. greeting is one of the common features of phishing email
  3. 4. is an example of social media
  4. 5. is used to navigate user to another page.
  5. 6. is a term call for a profile picture
  6. 9. surfing is when someone look over your shoulder as you enter password.