Across
- 2. Software that secretly collects user information.
- 5. The process of converting data into a secret code.
- 7. Software or hardware that blocks unauthorized network access.
- 9. Unwanted or junk email sent in bulk.
- 11. General term for software designed to harm computers.
- 12. A person who gains unauthorized access to systems.
- 14. A self-replicating program that spreads across computers.
- 15. Using technology to harass or humiliate others.
- 16. Secretly spying on another country or organization using IT.
- 18. Technology that creates realistic fake videos.
- 20. The right to control how your personal data is used.
Down
- 1. Monitoring of people’s digital activities.
- 3. The second part of the Facebook data misuse scandal.
- 4. A browser commonly used to access the Dark Web.
- 6. Malware that locks your data until payment is made.
- 8. A set of coded instructions for solving a problem.
- 10. Malicious software disguised as something useful.
- 13. The first part of the name of the Facebook data misuse scandal.
- 17. Company that had a massive 2013 data breach.
- 19. A cyberattack where fake messages trick you into revealing information.
