Across
- 3. A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
- 5. _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
- 6. The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
- 7. A program designed to spread from one computer to another is called a _ _ _ _ _.
- 10. The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
- 1. The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
- 2. _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
- 4. The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
- 8. A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
- 9. A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.
