Across
- 3. The process of converting information or data into a code, especially to prevent unauthorized access.
- 6. A person who uses computers to gain unauthorized access to data
- 7. Sending of unsolicited and commercial bulk message over the internet is known as spamming
- 9. A software or hardware that prevents unauthorized access to a network
- 11. A program that attempts to damage a computer system and replicate itself
- 14. A wireless technology for exchanging data over short distances.
- 15. theft The crime of obtaining the personal or financial information of another person to use their identity to commit fraud
Down
- 1. are weaknesses in software programs that can be exploited by hackers to compromise computers
- 2. The space in which users share information, interact with each other; engage in discussions or social media platforms
- 4. Software that automatically displays or downloads advertising material
- 5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 8. Part of the web that can’t be accessed by normal browsers
- 10. practice of sending fraudulent communications that appear to come from a reputable source
- 12. An automated process that interacts with other network services
- 13. A smartphone application that allows users to transfer money between bank accounts.