Across
- 1. he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- 4. repeated harmed through the use of computers, cell phones, and other electronic devices
- 5. a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- 8. type of computer program that's designed to seek out and remove computer viruses that have infected
- 9. data that directly follow either by clicking
- 11. when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- 12. text files with small data
- 15. a threat that involves sending email messages with a fake sender address
Down
- 2. the process of befriending someone online and make them do a physical meeting and physically harm them
- 3. unauthorized users who gain access to computers in order to steal, alter, or delete data
- 6. appears when an application wants you to pay attention.
- 7. software that spreads between computers and causes damage to data and software.
- 10. illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- 13. deceive people into revealing sensitive information or installing malware
- 14. Web pages, links in one domain
