Data Security

1234567891011
Across
  1. 4. a massive network of webpages, programs, and files that are accessible via URLs
  2. 5. with _______ encryption, the sender and receiver use different encryption keys
  3. 7. an attempt to trick a user into divulging their private information
  4. 8. a _____ horse is a harmful program that masquerades as a legitimate program
  5. 9. a service that allows you to hide your browsing from your ISP
  6. 11. a small amount of text that helps a website track information about a user across multiple pages of the website and personalize the user's experience on the website.
Down
  1. 1. holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom
  2. 2. technology or services that allow tracking of a users location
  3. 3. cookies that allow tracking of user behavior across websites
  4. 6. scrambling a message so it can't be read without a key
  5. 10. includes things that can identify you directly, such as your social security number, to things that may help identify you indirectly, such as your phone number or birthday.