Across
- 2. (7) – Malware that secretly monitors activity and collects data.
- 5. (10) – Copying work and claiming it as your own.
- 8. (13) – False or misleading information shared online.
- 10. (10,3,6) – Rules for using IT/internet in school/work.
- 12. (4) – Malware that spreads automatically across networks.
- 14. (8) – Fake messages that trick users into sharing details.
- 17. (8,4) – Information that identifies a person.
- 18. (10) – Scrambling data so only authorised users can read it.
- 19. (10) – Malware that locks files and demands payment.
- 20. (13) – Bullying or harassment using online platforms.
Down
- 1. (9) – Legal protection for creative work.
- 3. (14) – Proving identity before access is given.
- 4. (7,9) – The trail of data you leave online.
- 5. (6) – Illegal copying/downloading of copyrighted content.
- 6. (5) – Malware that attaches to files and spreads when run.
- 7. (6,11) – Manipulating people to give up information or access.
- 9. (6) – Malware disguised as legitimate software.
- 11. (7,8) – Controls what others/apps can see about you.
- 13. (7) – Harmful software designed to damage devices or steal information.
- 15. (8) – Security that filters traffic to block threats.
- 16. (9) – Software that detects and removes malware.
