Browsing safely

12345678910111213141516
Across
  1. 1. ______ is a popular anti-virus.
  2. 4. It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
  3. 5. ____ is any criminal activity intended to harm anyone using a computer and internet connection.
  4. 6. ____ also known as unethical hacker.
  5. 8. It refer to the act of stealing and misusing someone's personal Plus information.
  6. 9. Standard form of vital information resources under seize.
  7. 10. It is the process of befriending children on social media to facilitate online or physical sexual abuse.
  8. 13. Never share your ____ while chatting.
  9. 14. A ____ is a software that help in preventing unauthorised access to your computer.
  10. 16. It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
  1. 2. It is an act ab harming or harassing using information technology in deliberate manner.
  2. 3. _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
  3. 7. _______ is the use of illegal method to get money or other things that belong to bank or its customers.
  4. 11. ____ means hoaxing or misleading.
  5. 12. It referred to an illegal entry into a computer system or network.
  6. 15. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation.