Across
- 2. A person trying to break into systems
- 4. A fix for a software bug
- 6. Hides your location and protects online activity
- 9. Unwanted or fake emails
- 10. When something fake looks real
- 11. The name used to log in
- 12. Where you change privacy and security options
- 16. A hack that targets people instead of code
- 17. A misleading link that grabs attention
- 18. Blocks harmful internet traffic
- 21. Keeps apps and systems current and safe
- 22. A wireless connection you should secure
- 23. A message that warns you about danger
Down
- 1. When data is stolen or leaked
- 3. A secret code used to log in
- 5. Small bits of data saved by websites
- 7. A fake email that tricks you into giving info
- 8. A second step for logging in
- 9. A trick to steal money or data
- 13. Scrambles data so only you can read it
- 14. How your devices and accounts should be
- 15. A copy of important files
- 19. What you should do if something looks off
- 20. Typing your username and password
