Across
- 6. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- 9. Used to verify that data comes from a secure and trusted source.
- 12. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- 13. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- 15. A type of protocol that allows data to be sent and received securely over the internet.
- 16. Personal internet journals where the writer will type in their observations and opinions on certain topics.
- 18. Uses SMS system of mobile phones to send out fake text messages.
- 19. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- 20. Web applications or website that allow users to create and edit web pages using any web browser.
- 21. Refers to safety when using the internet like keeping personal data safe.
- 23. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
- 24. Software that gathers data by monitoring key press on the user/s keyboard.
Down
- 1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
- 2. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- 3. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- 4. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- 5. Authentication that relies on certain unique characteristics of human beings.
- 7. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- 8. The act of gaining unauthorized access to a computer system.
- 10. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- 11. Refers to the need to respect other user's views and display common courtesy when posting views online.
- 14. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- 17. Unsolicited email sent over the internet.
- 19. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- 22. A combination of letters, symbols and numbers that protects a system and allows a user to login.
