Across
- 3. – A system that blocks unauthorized access to a network
- 5. – Fake messages used to trick people into giving personal info
- 6. – Software that secretly collects your information
- 9. – A second step to verify your identity when logging in
- 10. – Protecting a computer network from threats
- 11. – A program that spreads and infects other files
- 13. – Software designed to harm or damage a computer system
- 14. – A person who tries to break into computer systems
- 15. – Protecting data by turning it into code
- 16. – Malware that spreads without user action
Down
- 1. – Stealing someone’s personal information
- 2. – A secret word used to access an account
- 4. – The trail of information you leave online
- 7. – Software that detects and removes malware
- 8. – When private information is exposed or stolen
- 12. – Software that locks your files and demands money
