Across
- 1. Viruses and spyware
- 3. Stores information on your computer
- 4. False warning
- 5. free from public attention
- 8. wireless data network
- 14. Threat created through connections
- 17. false content about another person
- 18. unwanted electronic devices
- 19. unauthorized moving of data
Down
- 2. Garenteer of a none imposter
- 5. Copying some elses work
- 6. false claims of legitimacy
- 7. Gap between opposites on a subject
- 9. Modify and publish content on a webpage
- 10. Threat actor
- 11. Fake online profile
- 12. harmful computer code
- 13. Computer infection
- 15. Unwanted email messages
- 16. Period of refrain from the internet