Girl Scouts Cybersecurity

12345678910111213141516
Across
  1. 2. The official procedure or system of rules
  2. 4. A virus that covertly monitors your online behavior without your knowledge or permission
  3. 5. A program that seems to be a helpful but actually is a virus
  4. 7. A string of characters that allows access to a computer system or service
  5. 11. Program instructions or a secret message
  6. 13. A group or system of interconnected people or things
  7. 14. A Software designed to detect and destroy computer viruses
  8. 15. a piece of code which is capable corrupting a system or destroying data
Down
  1. 1. A person who uses computers to gain unauthorized access to data
  2. 3. an identification used by a person with access to a computer, network, or online service
  3. 6. Software that displays unwanted pop-up adverts
  4. 8. copy data from one computer system to another, typically over the internet
  5. 9. A virus that employs encryption to hold a victim's information at ransom
  6. 10. A piece of code that's main goal is to self-replicate and infect other computers while remaining active on infected systems
  7. 12. A secret or disguised way of writing
  8. 16. Digital junk mail