Across
- 2. an incident where private or sensitive information is accessed or stolen without permission.
- 7. a computer or system that stores data and provides services or information to other devices on a network.
- 11. a unique number that identifies a device on a network or the internet.
- 13. software used to access and view websites on the internet, such as Chrome, Safari, or Firefox.
- 15. clickable text or an image that takes you to another webpage or section online.
- 16. a secret word or phrase used to log into an account and protect personal information.
Down
- 1. harmful software designed to damage devices, steal data, or disrupt systems.
- 3. a method of changing information into a secret code so only authorized users can read it.
- 4. the practice of protecting computers, networks, and data from digital attacks or unauthorized access.
- 5. the main name of a website, usually ending in .com, .org, or .net.
- 6. a scam where attackers try to trick users into sharing passwords or personal data through fake emails or messages.
- 8. a type of malware that spreads between devices and can damage files or slow performance.
- 9. a security system that controls incoming and outgoing internet traffic to block harmful activity.
- 10. small files stored on your device by websites to remember preferences, logins, or activity.
- 12. a device that sends internet data to computers, phones, and other devices in a home or office.
- 14. servers accessed over the Internet, often used for storing data remotely.
