Across
- 4. a massive network of webpages, programs, and files that are accessible via URLs
- 5. with _______ encryption, the sender and receiver use different encryption keys
- 7. an attempt to trick a user into divulging their private information
- 8. a _____ horse is a harmful program that masquerades as a legitimate program
- 9. a service that allows you to hide your browsing from your ISP
- 11. a small amount of text that helps a website track information about a user across multiple pages of the website and personalize the user's experience on the website.
Down
- 1. holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom
- 2. technology or services that allow tracking of a users location
- 3. cookies that allow tracking of user behavior across websites
- 6. scrambling a message so it can't be read without a key
- 10. includes things that can identify you directly, such as your social security number, to things that may help identify you indirectly, such as your phone number or birthday.
