IT Knowledge

12345678
Across
  1. 2. The right to keep your personal data secret.
  2. 4. Virtual Private Network; protects your browsing privacy.
  3. 5. Malicious code that replicates itself.
  4. 7. An offensive action against computer systems.
  5. 8. Malware that spreads through networks without human help.
Down
  1. 1. The secret string of characters used to verify identity.
  2. 3. Scrambling data so it cannot be read without a key.
  3. 6. Unsolicited and unwanted junk email.