cyber sceurity

1234567891011121314151617181920
Across
  1. 3. A person who breaks into systems to cause harm or steal data.
  2. 4. Transforming information to hide its meaning.
  3. 6. Deceptive activities to gain money or personal information illegally.
  4. 7. A small file that stores user data in the browser.
  5. 9. Illegal copying or sharing of software.
  6. 10. Unwanted bulk emails sent to many people.
  7. 13. The unique ID every device has on a network.
  8. 14. Ethical rules to follow while using the internet.
  9. 18. A system that filters network traffic for safety.
  10. 19. Unethical act of harassing someone online.
  11. 20. Ethical use of technology and internet.
Down
  1. 1. A malicious trick where users click on invisible or disguised elements.
  2. 2. A legal right that protects original digital works.
  3. 5. Copying someone’s work and claiming it as your own.
  4. 8. Secret word used to access an account.
  5. 11. The online record you leave behind.
  6. 12. Fake websites or emails used to trick users.
  7. 15. A malicious program that spreads by itself.
  8. 16. A person who breaks into systems.
  9. 17. The act of accessing a system without permission.