Across
- 4. Unauthorized access to a computer system
- 10. Connects your computer to a available network
- 13. Harassment or intimidation using online communication
- 14. A security system that moniters and controls incoming and outgoing network traffic
- 15. The process of verifying the identity of a user or a device
Down
- 1. Criminal activity carried out using computers and networks
- 2. Softwares that protect against viruses and malware
- 3. A message designed to trick you into revealing information
- 5. The set of rules for appropriate online communication and behavior
- 6. An unauthorized access and/or use of sensitive or confidential data
- 7. The process of converting information into a code to protect it from unauthorized access
- 8. A strong password should be this
- 9. Software designed to cause harm
- 11. The right of an individual to control access to their personal information
- 12. A malicious software program designed to damage or disrupt a computer system
