Across
- 2. Web applications or website that allow users to create and edit web pages using any web browser.
- 3. Software that gathers data by monitoring key press on the user/s keyboard.
- 9. Uses SMS system of mobile phones to send out fake text messages.
- 11. A type of protocol that allows data to be sent and received securely over the internet.
- 13. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- 16. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- 17. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- 20. Authentication that relies on certain unique characteristics of human beings.
- 21. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- 22. Used to verify that data comes from a secure and trusted source.
- 23. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- 24. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
- 1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
- 4. A combination of letters, symbols and numbers that protects a system and allows a user to login.
- 5. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- 6. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- 7. Personal internet journals where the writer will type in their observations and opinions on certain topics.
- 8. Refers to the need to respect other user's views and display common courtesy when posting views online.
- 10. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- 12. The act of gaining unauthorized access to a computer system.
- 14. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- 15. Unsolicited email sent over the internet.
- 18. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- 19. Refers to safety when using the internet like keeping personal data safe.
