Across
- 2. tricking users into clicking links
- 5. access code for unscrambling data
- 7. internet accessible to anyone
- 11. Harassment occurs online.
- 13. malware pretending to be useful
- 14. attacks seeking personal information.
- 15. tracking software
- 17. malware that shows advertisements
- 18. manipulated media for false perceptions.
- 19. unauthorized users access sensitive information
- 20. harmful software
Down
- 1. criminal using hacking for bad
- 3. software that checks for malware
- 4. malware that makes you pay
- 6. scrambling data to keep protected.
- 8. professional using hacking for good
- 9. bringing personal device to work.
- 10. many bots preventing legitimate users.
- 12. a unique string of numbers
- 16. data shield
