Across
- 3. Voice over Internet ______.
- 7. Wireless internet connection.
- 8. Short text messages sent on mobile phones.
- 13. Scrambling data so only authorized people can read it.
- 14. Security staff who protect buildings and equipment.
- 15. The legal right of a creator to control their work.
- 17. A natural event that may damage data or computers.
- 18. Someone who gains unauthorized access to computer systems.
- 21. A secret word used to log into a computer system.
- 22. Software that protects your computer from harmful programs.
- 24. Rules that allow computers to communicate over the internet.
- 25. Used to physically secure equipment like doors and cabinets.
Down
- 1. Phone calls made using the internet.
- 2. Copying someone else's work and claiming it as your own.
- 4. Harmful software that damages computers.
- 5. A trick email used to steal personal information.
- 6. Devices used to monitor people in secure areas.
- 9. Physical parts of a computer system.
- 10. Illegal copying or distribution of software.
- 11. A program that blocks unwanted access to a network.
- 12. Sending messages electronically through the internet.
- 16. The accuracy, consistency, and reliability of data.
- 19. Dishonest activity intended to gain something illegally.
- 20. A type of messaging that happens instantly online.
- 23. The protection of data from unauthorized access.
