Across
- 5. The act of turning encrypted data into readable text
- 9. The act of sending someone advertisements or fake emails continuously
- 11. The software that checks files for viruses
- 13. The built-in software of a computer that checks everything entering the computer for malware
- 15. Things that we use daily and need to update in order to have the latest features
- 17. It is necessary to keep a ______ of your files in order to not lose them
- 18. Data when it has some sort of meaning attached to it
- 19. The act of viewing others' private information, mainly through malware
Down
- 1. Someone who gains access to, encrypts, or deletes personal information
- 2. Illegal copying of copyrighted information
- 3. The act of stealing and misusing someone's personal information
- 4. The act of doing fraudulent/criminal activity on the internet
- 6. The track you leave when you browse the internet
- 7. Hackers can gain ______ to your private information without you knowing
- 8. The act of harassing someone on the internet
- 10. Someone who illegally copies and distributes paid software for free
- 12. The moral principles of the internet
- 14. The piece of text used to identify if the correct person is trying to log in
- 16. The policy that helps protect original works from plagiarism
