Across
- 4. The most common way attackers send phishing links.
- 7. secret string of characters used to gain access.
- 8. To break into a computer system illegally
- 11. The written instructions that make software work.
Down
- 1. Safe or protected from attack
- 2. Malicious code that spreads from computer to computer.
- 3. Online storage where data is kept instead ofon your hard drive
- 5. Information that AI needs to analyze to learn.
- 6. Short for "robot," an automated program.
- 9. Prefix relating to computers, information technology and the internet.
- 10. An AI tool that has been trained on data to make predictions
