The Interceptors

1234567891011121314
Across
  1. 2. A harmful action where malicious software tries to damage or access systems.
  2. 4. Doing what is right and responsible when using technology.
  3. 5. Online storage that saves data on remote servers instead of your device.
  4. 10. A smart device at home that records video and sends alerts to users.
  5. 11. A connection point used to enter or move through a digital system.
  6. 12. A safe copy of important data stored in another location.
  7. 13. A powerful computer that stores, manages, and sends data.
  8. 14. A weakness in a system that can be exploited.
Down
  1. 1. Hardware used to save or store digital information.
  2. 3. Everyday objects that connect to the internet and share data.
  3. 6. Information you leave behind when you use the internet.
  4. 7. Malware that locks files and demands payment to unlock them.
  5. 8. Someone who finds and uses weaknesses in computers or networks.
  6. 9. A tool used to stop harmful data or bots inside the supercomputer.
  7. 10. A tool used to shut down portals and block attacks.