Across
- 1. A harmful program that can replicate itself and spread to other computers. (5 letters)
- 5. An electronic message sent indiscriminately to large numbers of recipients. (4 letters)
- 7. To copy files to a second medium (like a hard drive) as a precaution against loss or damage. (6 letters)
- 8. The type of software used to protect your computer from viruses. (8 letters)
- 10. A type of software that collects information about a computer user without their knowledge. (7 letters)
- 11. The act of tricking someone into giving confidential information. (8 letters)
- 13. A scam that tricks individuals into revealing sensitive personal information, often through deceptive emails. (8 letters)
- 14. The act of monitoring someone's activities without their knowledge. (7 letters)
- 15. An attempt to make someone reveal their password or other sensitive information under false pretenses. (8 letters)
Down
- 2. A technique used to deceive users into thinking they are interacting with a trusted entity, commonly used in phishing attacks. (7 letters)
- 3. The act of monitoring someone's activities without their knowledge. (7 letters)
- 4. The process of converting information or data into a code to prevent unauthorized access. (11 letters)
- 5. The act of making an unauthorized copy of data. (7 letters)
- 6. The protective measure to keep your accounts safe; often a mix of letters, numbers, and symbols. (8 letters)
- 9. An unauthorized attempt to gain access to someone's data or computer. (6 letters)
- 12. The practice of using a computer to gain unauthorized access to data. (7 letters)
