Across
- 2. The right to keep your personal data secret.
- 4. Virtual Private Network; protects your browsing privacy.
- 5. Malicious code that replicates itself.
- 7. An offensive action against computer systems.
- 8. Malware that spreads through networks without human help.
Down
- 1. The secret string of characters used to verify identity.
- 3. Scrambling data so it cannot be read without a key.
- 6. Unsolicited and unwanted junk email.
