Across
- 3. there is no known way to replicate it
- 5. unique characteristics of human beings
- 9. When a message undergoes encryption it becomes
- 12. makes the data meaningless
- 14. avoid the need to utilise so much computer time for each connection
- 18. legitimate-looking emails
- 19. log all incoming and outgoing traffic
- 20. internet is an _______ forum
- 21. junk email
Down
- 1. gathers data by monitoring key presses
- 2. gaining unauthorised access to a computer system
- 4. compares patterns of ‘ridges’ and ‘valleys'
- 6. uses short message service system of mobile phones to send out fake text messages
- 7. redirect the user to a fake website without their knowledge
- 8. software that can replicate/copy itself with the intention of deleting or corrupting files on a computer
- 10. found on a digital certificate
- 11. refers to any data concerning a living person who can be identified either from the data itself or from the data in conjunction with other information
- 13. voice mail message to trick the user into calling a telephone number
- 15. a small look-up table containing pairs of values
- 16. refers to safety when using the internet
- 17. allows data to be sent and received securely over the internet