unit 26-28 Fekete Konor
Across
- 2. Devices that generate unique identifiers to ensure access to sensitive information.
- 8. Software that enables financial transactions on a website, such as purchases.
- 10. A type of cyber attack where an attacker sends fake emails or messages that appear to be from a legitimate source, in an attempt to steal sensitive information.
- 11. Individuals who try to obtain or steal software or game licenses through illegal means.
- 12. A business model that combines traditional retail sales and online sales.
- 14. The unauthorized use or distribution of copyrighted materials, such as music, movies, or software.
Down
- 1. software that enables users to store and manage their payment information, such as credit card numbers and expiration dates.
- 3. A network security system that monitors and controls incoming and outgoing network traffic.
- 4. A type of self-replicating software that can spread across a network without human intervention.
- 5. A type of bad software that can cause harm to a computer or a network. Examples include viruses, trojans, and rootkits.
- 6. The act of harassing or threatening someone online, often through social media or email.
- 7. A unique number used by banks to identify transactions.
- 8. A personal identification number used for bank cards or other security systems.
- 9. A protocol that enables secure communication between websites and users.
- 13. Software that monitors a computer's data transmission and collects sensitive information.