Across
- 5. When raw data is put into context and has meaning, the data transforms into ...
- 8. A type of malware that records every single press of the keyboard that you make.
- 9. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
- 10. The IT ... 2000 is the law used to prosecute cybercrime in India
- 12. link designed to steal personal information.
- 13. Settings on folders or files that control who is allowed to access them.
Down
- 1. I am not a robot.
- 2. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
- 3. Gaining unauthorised access to or control of a computer system.
- 4. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- 6. Malicious code intended to monitor your activity without your permission.
- 7. An email that contains a message with a
- 11. A malicious code typically disguised as a legitimate program.
