Across
- 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this (paragraph 4)
- 3. these are the usernames or passwords you use to access a website (paragraph 6)
- 7. these fake sites imitate official ones with the intent to collect your personal information (paragraph 6)
- 10. a software designed to detect or destroy viruses (paragraph 9)
- 11. it is the address of a specific webpage or file on the internet (paragraph 6)
- 12. the information processed and stored by electronic devices (paragraph 2)
Down
- 1. people who commit crimes by means of computers or the internet (paragraph 6)
- 4. the deceitful practice of sending emails pretending to be from legitimate companies for you to reveal personal information, such as passwords and credit card numbers (paragraph 8)
- 5. a software designed to stop the normal functioning of computers (paragraph 7)
- 6. it contains a group of computers that can be accessed and administered with a common set of rules defined a by a company or institution (paragraph 4)
- 8. it is a form of security that allows or blocks traffic based on a set of security rules (paragraph 3)
- 9. a digital replication of something real (paragraph 2)