Across
- 3. the safe and responsible use of technology such as the use of internet and electronic media text message and sosial media
- 7. a combination of voice and phishing which fraudsters obtain personal details of victim through their landline telephone
- 8. a file or code typically delivered over network that infects,explores steals or conducts virtually any behavior an attacker wants
- 9. records the activities of the user,such as password and transmits this information to the person who wrote malware
- 11. damage muscle tendons and nerve from repetitive motion such as bad posture
- 15. malware design to deny user to access file on their computer
- 17. Unsolicited bulk emails
- 18. a job arrangement thattake into account an individual person needs
- 19. people who have been doing skilled type of a job replaced by technology requiring operators with less skill
- 20. a type of malware design to give hacker access to and control over a target device
Down
- 1. a full time job split between two employee with responsibility for success of the total job
- 2. the activity of identifying weaknesses in a computer system or network to exploit the security system to gain access to personal data or business data
- 4. records that are used to identify people by a physical attribute that doesent change
- 5. protective barrier between computer and any computer that are connected
- 6. unwanted software design to throw advertisement up on your screen within web browser
- 10. date relating to a living induvidual it cover any information that relates to an identifiable living induviduals
- 12. a criminal activity trying to find sensitive information such as password or banking details by fraudulent means
- 13. When a person is employed to work fewer hours than the normal working week
- 14. uses mobile phone text message to trick people into returning call
- 16. when people change their job by learning the new skills necessary for another job