Across
- 3. Unwanted, unsolicited messages
- 4. Computer network security system that restricts internet traffic
- 7. Use of online platforms to bully/harass
- 11. Receives and sends data on computer networks
- 12. A person who breaks into computer system
- 13. Software tool to take advantage of software
- 14. Small update to fix bugs
- 16. A technology that creates secure connection
- 17. Storing and accessing data
- 18. Software application to access/view websites
- 19. Technique for attempting to acquire data
- 20. Network of computers infected by malware
Down
- 1. Malware that spreads causing damage to data
- 2. Program that's intentionally harmful to computers
- 5. Process of verifying someone's identity
- 6. Application of intelligent algorithms
- 8. Process of making a copy
- 9. Network acting as entrance to another network
- 10. Safe and responsible use of information/technology
- 15. Way to scramble data
