Across
- 2. A law passed after 9/11 that expanded government surveillance powers to fight terrorism.
- 4. Data kept by internet service providers about your internet activity.
- 5. Fake computer systems set up to attract and catch hackers.
- 10. A type of malware that spreads on its own across computers without needing user action.
- 11. Ethical hackers who test systems to find and fix security problems.
- 13. Software that detects and removes programs that secretly collect your data.
- 16. Security methods that use body traits (like fingerprints or face recognition).
- 18. Hacking that is done to promote a political or social cause.
Down
- 1. Overloading a website or server so it crashes or becomes unavailable.
- 3. Filing a lawsuit in a place with laws favorable to the person claiming defamation.
- 6. Stealing someone’s personal information to commit fraud.
- 7. A U.S. law that makes unauthorized access to computers illegal.
- 8. Records of activity (like connections and traffic) stored by a network router.
- 9. Tricking people into giving personal info (like passwords) through fake emails or websites.
- 12. Breaking into a computer system or network, usually without permission.
- 14. A global network that connects computers and allows communication and information sharing.
- 15. Security systems that block or allow network traffic to protect computers from threats.
- 17. A powerful computer worm designed to damage industrial systems (famously used against Iran’s nuclear program).
- 19. Anything related to computers, networks, or the internet.
- 20. Phishing done through phone calls or voice messages.
