E-safety

123456789101112131415161718192021
Across
  1. 5. unique characteristics of human beings
  2. 6. legitimate-looking emails
  3. 9. there is no known way to replicate it
  4. 11. found on a digital certificate
  5. 13. makes the data meaningless
  6. 14. refers to any data concerning a living person who can be identified either from the data itself or from the data in conjunction with other information
  7. 15. software that can replicate/copy itself with the intention of deleting or corrupting files on a computer
  8. 17. avoid the need to utilise so much computer time for each connection
  9. 19. gathers data by monitoring key presses
  10. 21. redirect the user to a fake website without their knowledge
Down
  1. 1. voice mail message to trick the user into calling a telephone number
  2. 2. uses short message service system of mobile phones to send out fake text messages
  3. 3. compares patterns of ‘ridges’ and ‘valleys'
  4. 4. refers to safety when using the internet
  5. 7. junk email
  6. 8. internet is an _______ forum
  7. 10. a small look-up table containing pairs of values
  8. 12. When a message undergoes encryption it becomes
  9. 16. allows data to be sent and received securely over the internet
  10. 18. gaining unauthorised access to a computer system
  11. 20. log all incoming and outgoing traffic