Cybersecurity & Internet

12345678910111213141516171819202122
Across
  1. 3. A fraudulent attempt to obtain sensitive information via the internet.
  2. 5. A structured set of data held in a computer.
  3. 7. A form of bullying that occurs online.
  4. 10. The act of stealing someone’s personal information for malicious purposes.
  5. 11. A global network connecting millions of computers.
  6. 12. Software designed to harm or exploit devices.
  7. 13. The amount of data that can be transmitted in a fixed amount of time.
  8. 15. The correct or acceptable way of communicating on the internet.
  9. 17. A system designed to prevent unauthorized access to or from a network.
  10. 19. A protocol used to transfer data over the internet.
  11. 20. Individuals who exploit the internet to harm others.
  12. 22. A unique identifier in a database.
Down
  1. 1. The use of the internet to stalk or harass someone.
  2. 2. Software used to manage and organize databases.
  3. 4. Increased capacity for data transfer.
  4. 6. A password that is difficult for others to guess or crack.
  5. 8. A device that forwards data packets between computer networks.
  6. 9. A unique string of numbers assigned to each device on a network.
  7. 14. Reduced capacity for data transfer.
  8. 16. The trail of data that individuals leave when using the internet.
  9. 18. The system that translates domain names into IP addresses.
  10. 21. Illegal activities that involve computers or networks.