Across
- 3. attacks nationwide networks
- 6. string of upper and lowercase letters/numbers
- 8. malicious computer code
- 9. motivated by principles or beliefs
- 10. use of technology to stalk someone
- 13. unlocks encrypted information
- 16. a false warning
- 17. specifies design and arrangement
- 20. harmful computer code
- 21. hides inside another program
Down
- 1. bullying that takes place with a device/online
- 2. stores information on your computer
- 4. security threat from own employees
- 5. waste from discarded digital services
- 7. ensures no imposters
- 11. prevents device function until paid
- 12. wireless data technology
- 14. free from public attention
- 15. email with false claims
- 18. malicious software
- 19. unwanted email
