Browsing safely

123456789101112131415
Across
  1. 1. he practice of protecting networks, applications, sensitive information, and users from cyber attacks
  2. 4. repeated harmed through the use of computers, cell phones, and other electronic devices
  3. 5. a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
  4. 8. type of computer program that's designed to seek out and remove computer viruses that have infected
  5. 9. data that directly follow either by clicking
  6. 11. when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
  7. 12. text files with small data
  8. 15. a threat that involves sending email messages with a fake sender address
Down
  1. 2. the process of befriending someone online and make them do a physical meeting and physically harm them
  2. 3. unauthorized users who gain access to computers in order to steal, alter, or delete data
  3. 6. appears when an application wants you to pay attention.
  4. 7. software that spreads between computers and causes damage to data and software.
  5. 10. illegal activities involving computers, networks, or the internet as a tool to commit attacks.
  6. 13. deceive people into revealing sensitive information or installing malware
  7. 14. Web pages, links in one domain