Across
- 1. Being free from the Public
- 3. Stealing personal information from users
- 4. String of characters accessing information
- 6. Someones who harms other users
- 7. False display gaining private information
- 14. Verify identity on physical characters
- 15. Help protect and secure passwords
- 16. File website stores information on computer
- 17. Unwanted messages from unknown users
- 18. Move files to remote locations
- 19. A false warning
Down
- 2. Ensuring request information not imposter
- 3. Security treats inside the company
- 5. Behavioral hazard when user obsess
- 8. Sciences designed to arrange items
- 9. Active file that are harmful
- 10. Malware hidden inside another program
- 11. Technology used to stalk others
- 12. Toxic waste from discarded devices
- 13. Collection of harmful computer codes