Across
- 6. To pose or pretend to be another person in email
- 8. Don't ___ any file you weren't expecting to receive
- 13. Process of protecting data by secret code
- 15. A criminal tool used for extortion
- 16. Human characteristics used for identification
- 18. When a criminal uses text messages to trick you
Down
- 1. Phishing for the big prize!
- 2. Unauthorized user with malicious intent
- 3. A program that hides functions that are potentially malicious
- 4. A self-replicating malicious program
- 5. A software program that enters a computer system without the owner's knowledge or consent
- 7. A system that prevents unauthorized access
- 9. a software or data update that fixes bugs
- 10. Your password is like a ___, use it regularly, change it often and do not share it with anyone else
- 11. Vast underbelly of the internet
- 12. The First step in case of data leak is to ____
- 14. a computer program or system intended to distinguish human from machine input
- 17. A sickness in your system
