Across
- 2. EMAILS WHICH ARE NOT REQUESTED
- 3. TRACKS USERS DATA ENTRY
- 4. DISPLAYS ADVERTS REPEATEDLY
- 5. THIS SHOULD BE CHANGED OFTEN AND CONTAIN LETTERS,SYMBOLS AND NUMBERS
- 7. THIS MUST MATCH A GIVEN PASSWORD TO GAIN ACCESS TO A SYSTEM
- 10. USES A WEBSITE WHICH IS VERY SIMILAR TO THE ORIGINAL
- 13. CAN MAKE USERS ANONYMOUS BY CREATING A NEW IP.
- 16. VIRUS SOFTWARE DATABASE SHOULD BE THIS
- 17. USE OF A FRAUDULENT EMAIL
- 18. A REASON HACKERS HACK
- 19. THESE SHOULD BE RUN DAILY TO CHECK FOR VIRUSES
- 20. THIS IS NEEDED TO DECODE SCRAMBLED DATA
Down
- 1. CAN ENTER SYSTEM VIA SOFTWARE INSTALLATION
- 2. THESE CAN BE CHANGED BY MALWARE
- 3. A EXAMPLE OF ENCRYPTION
- 6. LINK ON AN EMAIL AND A POSSIBLE SOURCE OF A VIRUS
- 7. COMPUTER IS TRICKED INTO THINKING THIS IS GENUINE
- 8. DETAILS OFTEN ASKED TO CHANGE WHEN PHISHING IS USED
- 9. A PIECE OF CODE THAT INFECTS A SYSTEM
- 11. SOMETHING ON A SYSTEM A VIRUS COULD AFFECT
- 12. A TYPE OF DATA HACKERS MAY STEAL
- 13. THIS IS AFFECTED WHEN A VIRUS INFECTS A SYSTEM
- 14. THE CODING/SCRAMBLING OF DATA
- 15. PROTECTION BETWEEN A LAN AND WAN
