INTERNET VOCABULARY

12345678910
Across
  1. 2. An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
  2. 6. A secret combination of characters used for user authentication and access to secured information.
  3. 8. Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
  4. 9. The process of copying data or files from a remote server or website to a user's device.
  5. 10. A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
  1. 1. The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
  2. 3. A malicious software that can replicate itself and spread to other computers.
  3. 4. Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
  4. 5. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. 7. A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
  6. 8. Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.