Internet security
Across
- 5. trail data left behind when using the internet
- 7. the right to control personal information
- 8. into to investigate or spy without permission
- 9. software or hardware that blocks unauthorized access
- 12. people who gain unauthorized access to computer systems
- 14. monitoring of activities or data, often by authorities
- 16. gaining access secretly, often to steal or corrupt data
- 18. software that secretly monitors user activity
- 19. taken control of without authorization
- 23. illegal activities carried out via the internet
- 25. secret codes used to access systems or data
- 28. the process of encoding data for security
- 29. theft illegal use of someone’s personal information
- 30. enforcement agencies government bodies that enforce laws and investigate crime
- 31. software software designed to harm or exploit systems
- 32. ensuring information is not disclosed to unauthorized parties
Down
- 1. programs software designed to detect and remove viruses
- 2. excessive data or traffic causing systems to slow or crash
- 3. attempts to trick people into revealing personal data
- 4. general term for harmful software like viruses or Trojans
- 6. compromised or damaged by malware or viruses
- 10. malicious programs that spread between computers
- 11. details personal or confidential access credentials
- 13. deceptive schemes to defraud or steal
- 15. Brother symbol of invasive or authoritarian surveillance
- 17. security measures to protect data and systems on the internet
- 20. people who commit crimes using the internet
- 21. converted into a secure code to prevent unauthorized access
- 22. horses malicious programs disguised as legitimate software
- 24. to set up software or systems for use
- 26. of service attack an attack that floods a server to make it unavailable
- 27. liberties rights and freedoms protecting individual privacy and freedom
- 32. converted into a form that hides its true content