Across
- 2. A fraudulent email purportedly from a reputable company attempting to get personal information
- 6. Something personal to you and should never be shared
- 9. A malicious software designed to block access to a computer system until a sum of money is paid
- 11. The process of identifying a user’s identity
- 12. The process of taking plain text and scrambling it into an unreadable format
- 14. A combination of the words “robot” and “network”
- 15. A piece of software or application that displays advertisements on your computer
- 16. A piece of hardware or software, used to keep intruders out
- 17. An icon displayed along a web browser URL; indicates a secure mode
- 18. the address of a website; check its validity before clicking on it
- 19. Unauthorized access to a network, information systems or application
- 20. Alert / Always on the lookout
Down
- 1. A sequence of words or text used to control access to a computer; similar to a password
- 3. A form of malware used by hackers to spy on you and your computer activities
- 4. A flaw or weakness in a computer system that could be exploited to violate the system’s security
- 5. Threatening behavior facilitated through electronic means such as texting
- 7. In addition to passwords; provides better security
- 8. Facebook, Twitter, Instagram etc. (Two Words)
- 10. When a hacker changes source of an email so that it seems to come from a trusted source
- 13. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer