Across
- 2. Sending unsolicited bulk messages online.
- 3. Digital evidence left behind after using the internet.
- 6. The right to control personal digital information.
- 7. Converting coded data back into readable form
- 8. Acts like hacking or identity theft
- 9. A form of cybercrime asking for payment to restore data
- 10. Scrambling data to keep it safe.
- 11. Altering digital content and claiming it as your own
- 13. Criminal activity involving a computer or network.
Down
- 1. Malicious code designed to harm systems
- 3. Technology used to protect against unauthorized access
- 4. Harassment that takes place over digital devices.
- 5. A person who breaks into systems illegally.
- 6. Illegal copying or use of software.
- 12. A self-replicating program that spreads without permission.
