Across
- 5. uses a private key and a public key
- 9. when the computer asks users if they are sure they want to carry out instructions
- 10. a type of software which may track user behavior to display targeted ads based on their interests
- 11. one method for avoiding acccidental data loss
- 12. an attack on a server designed to deny service coming from multiple computers
Down
- 1. sits between the main server and the internet and protects the main server from attacks
- 2. programs that collect personal or sensitive data then send them to another device
- 3. when an authentic-looking message or email tries to trick you into sending sensitive data
- 4. malicious software which tricks you into visiting false websites and giving sensitive data
- 6. a program that disguises itself as another programs, when run it deletes and corrupts files
- 7. a security technology that monitors a computer’s incoming and outgoing traffic
- 8. programs that replicate themselves over and over and fill the computer storage
- 9. self-replicating software which can delete and corrupt files
