Across
- 3. something you access with a username and password
- 6. prevent someone from contacting you
- 8. a computer that is under the control of a malicious hacker without the knowledge of the computer owner
- 9. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer
- 10. using a computer to gain unauthorized access to data in a system
- 12. a trail of data you create while using the Internet
- 13. a secret word or phrase that allows access to a phone, computer system or service
- 15. taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- 17. messages that try to trick you into providing sensitive information
- 18. email that is not wanted
Down
- 1. a program that is designed to harm a computer by deleting data
- 2. event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data
- 4. when a person is harassed, humiliated, or tormented online
- 5. steps taken to protect a computer or computer system against unauthorized access or attack
- 7. something that lasts forever
- 11. malicious software designed to collect and transmit private information
- 14. test commonly used by websites to verify the user is a real human and not a bot
- 16. a type of software designed to block access to a computer system until a certain amount of money is paid