Unit 8.3 Security of Data
Across
- 3. Unauthorized access to computer systems
- 5. Using physical traits like fingerprints for security
- 9. Redirecting users to fake websites without their knowledge
- 11. Scam using SMS messages to steal information
- 12. Software used to detect and remove viruses
- 14. Tricking users into revealing personal info via fake emails
- 15. Protocol for secure communication over the internet
Down
- 1. theft Stealing personal or sensitive digital information
- 2. Voice call scam pretending to be from a trusted source
- 4. fraud Unauthorized use of someone’s payment card
- 6. Scrambling data to make it unreadable without a key
- 7. General term for malicious software like viruses or spyware
- 8. Malicious software that spreads and causes harm
- 10. Secret words used to authenticate users
- 13. Security system that controls incoming and outgoing traffic