Across
- 3. Vital information and resources under seize
- 4. hackers who dont enter anyone's computer to steal
- 5. A unique identifier for your computer online
- 6. A process of befriending children on social media to facilitate online or physical sexual abuse
- 8. A software that protects your computer from threats
- 10. theft Acr of stealing and misusing someone's personal information
- 11. A virtual tool that masks your online location
Down
- 1. A harmful email that tries to trick you into giving information
- 2. A strong sequence of letters, numbers, and symbols used to protect online accounts.
- 4. spoofing an attacker uses an email header to mask their own identity and impersonate a legitimate sender. (
- 6. Harassment that happens online
- 7. The process of encoding data to make it unreadable to unauthorized users.
- 9. Protecting your personal information online
