Across
- 3. Using the internet to harass or intimidate someone.
- 4. A person who uses computers to gain unauthorized access to data.
- 6. A secret string of characters used to authenticate a user.
- 8. Software used to prevent, detect, and remove malicious programs.
Down
- 1. Software intended to damage or disable computers.
- 2. A security system that monitors and controls network traffic.
- 5. Small files stored on your browser to track site activity.
- 6. Fake emails or sites used to trick people into giving away passwords.
- 7. Unwanted or junk emails sent in bulk.
- 9. Theft involving personal information used for fraud.
