Across
- 3. Creating fake documents or signatures to deceive others.
- 4. Small text files stored on a computer by websites to remember user preferences or track activity.
- 7. A security feature that isolates suspicious files to prevent them from harming the system.
Down
- 1. A cyberattack that redirects users from a legitimate website to a fake one to steal information.
- 2. Online harassment where someone repeatedly follows or monitors another person digitally.
- 5. Software designed to detect and remove malicious programs from a computer.
- 6. Security barriers that block unauthorized access to or from a private network.
