CYBER SECURITY

1234
Across
  1. 2. attempt to acquire sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  2. 4. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. 1. never respond to unusual___.
  2. 2. never give your ___ information online.
  3. 3. bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.