TEQ-OVER

123456789101112131415161718
Across
  1. 6. To pose or pretend to be another person in email
  2. 8. Don't ___ any file you weren't expecting to receive
  3. 13. Process of protecting data by secret code
  4. 15. A criminal tool used for extortion
  5. 16. Human characteristics used for identification
  6. 18. When a criminal uses text messages to trick you
Down
  1. 1. Phishing for the big prize!
  2. 2. Unauthorized user with malicious intent
  3. 3. A program that hides functions that are potentially malicious
  4. 4. A self-replicating malicious program
  5. 5. A software program that enters a computer system without the owner's knowledge or consent
  6. 7. A system that prevents unauthorized access
  7. 9. a software or data update that fixes bugs
  8. 10. Your password is like a ___, use it regularly, change it often and do not share it with anyone else
  9. 11. Vast underbelly of the internet
  10. 12. The First step in case of data leak is to ____
  11. 14. a computer program or system intended to distinguish human from machine input
  12. 17. A sickness in your system