Across
- 2. Positions ideal for individuals with more than five years of experience
- 5. A trail of data intentionally left behind by a user
- 10. Store information across pages within the site
- 12. Crime that involves a computer and/or a network
- 13. Describes the digital environment in which computer networks communicate
- 16. Software that automatically displays or downloads advertising material
- 18. A type of malicious software
- 20. Links two or more devices
- 21. Someone who uses the internet to cause harm to a victim
- 22. Online harassment that uses electronic communication
- 23. Web browser feature
Down
- 1. Someone who uses a computer to gain access to systems or networks
- 3. Internet connection that encrypts traffic from a device to a private network
- 4. A standalone self-replicating software application that invades and destroys computers
- 6. Do not share ____________ across multiple sites
- 7. Software that allows an attacker to obtain information on another computer
- 8. Personally identifiable information
- 9. Malicious attempts by hackers to damage, steal, or destroy a computer
- 11. ___________ engineering is when an attacker manipulates someone into revealing information
- 14. Attacker sends fraudulent emails to deceive someone into revealing information
- 15. Software designed to disrupt, damage, or gain unauthorized access to a computer
- 17. Descriptive data that contains information about other data
- 19. In 1988, Robert __________ unleashed a malicious computer program
