Across
- 2. Process of protecting data by secret code
- 3. When a criminal uses text messages to trick you
- 6. A sickness in your system
- 7. The potential for losing valuable information
- 10. A system that prevents unauthorized access
- 11. A program that hides functions that are potentially malicious
- 12. A software program that enters a computer system without the owner's knowledge or consent
- 15. A routine fix for a computer program
- 16. Device used to identify a human person entering data
- 18. What you should do if you see any anomaly
- 19. Unauthorized user with malicious intent
- 20. A self-replicating malicious program
Down
- 1. Your password is like a ___, use it regularly, change it often and do not share it with anyone else
- 2. No reputable organization is going to ask you for private information via
- 4. To pose or pretend to be another person in email
- 5. Human characteristics used for identification
- 7. A criminal tool used for extortion
- 8. Vast underbelly of the internet
- 9. A small computer defect
- 13. Phishing for the big prize!
- 14. Don't ___ any file you weren't expecting to receive
- 17. If there is not a padlock icon in the search bar the website may be ___