Internet security

1234567891011121314151617181920212223242526272829303132
Across
  1. 5. trail data left behind when using the internet
  2. 7. the right to control personal information
  3. 8. into to investigate or spy without permission
  4. 9. software or hardware that blocks unauthorized access
  5. 12. people who gain unauthorized access to computer systems
  6. 14. monitoring of activities or data, often by authorities
  7. 16. gaining access secretly, often to steal or corrupt data
  8. 18. software that secretly monitors user activity
  9. 19. taken control of without authorization
  10. 23. illegal activities carried out via the internet
  11. 25. secret codes used to access systems or data
  12. 28. the process of encoding data for security
  13. 29. theft illegal use of someone’s personal information
  14. 30. enforcement agencies government bodies that enforce laws and investigate crime
  15. 31. software software designed to harm or exploit systems
  16. 32. ensuring information is not disclosed to unauthorized parties
Down
  1. 1. programs software designed to detect and remove viruses
  2. 2. excessive data or traffic causing systems to slow or crash
  3. 3. attempts to trick people into revealing personal data
  4. 4. general term for harmful software like viruses or Trojans
  5. 6. compromised or damaged by malware or viruses
  6. 10. malicious programs that spread between computers
  7. 11. details personal or confidential access credentials
  8. 13. deceptive schemes to defraud or steal
  9. 15. Brother symbol of invasive or authoritarian surveillance
  10. 17. security measures to protect data and systems on the internet
  11. 20. people who commit crimes using the internet
  12. 21. converted into a secure code to prevent unauthorized access
  13. 22. horses malicious programs disguised as legitimate software
  14. 24. to set up software or systems for use
  15. 26. of service attack an attack that floods a server to make it unavailable
  16. 27. liberties rights and freedoms protecting individual privacy and freedom
  17. 32. converted into a form that hides its true content