Across
- 3. Login info like usernames and passwords.
- 5. A break-in where data is stolen or exposed.
- 7. Secret codes used to log in.
- 9. Old and missing the latest fixes or features.
- 10. Exposed or no longer safe.
- 13. Connected computers that share info.
- 15. Trying many stolen passwords to break into accounts.
- 17. A space that holds data temporarily.
- 18. Easy to break or guess.
- 20. Personal logins used for apps or websites.
Down
- 1. When a service or system stops working.
- 2. Information stored or used by computers.
- 4. Files saved from the internet to your device.
- 6. Marked to stand out or draw attention.
- 8. A group of tools or parts that work together.
- 11. Tricking people to share private info using fake messages.
- 12. A fix or improvement added to software.
- 14. When too much data is added and causes an error.
- 16. Permission to use or enter something.
- 19. Getting into a computer or system without permission.
