unit 26-28 Fekete Konor

1234567891011121314
Across
  1. 2. Devices that generate unique identifiers to ensure access to sensitive information.
  2. 8. Software that enables financial transactions on a website, such as purchases.
  3. 10. A type of cyber attack where an attacker sends fake emails or messages that appear to be from a legitimate source, in an attempt to steal sensitive information.
  4. 11. Individuals who try to obtain or steal software or game licenses through illegal means.
  5. 12. A business model that combines traditional retail sales and online sales.
  6. 14. The unauthorized use or distribution of copyrighted materials, such as music, movies, or software.
Down
  1. 1. software that enables users to store and manage their payment information, such as credit card numbers and expiration dates.
  2. 3. A network security system that monitors and controls incoming and outgoing network traffic.
  3. 4. A type of self-replicating software that can spread across a network without human intervention.
  4. 5. A type of bad software that can cause harm to a computer or a network. Examples include viruses, trojans, and rootkits.
  5. 6. The act of harassing or threatening someone online, often through social media or email.
  6. 7. A unique number used by banks to identify transactions.
  7. 8. A personal identification number used for bank cards or other security systems.
  8. 9. A protocol that enables secure communication between websites and users.
  9. 13. Software that monitors a computer's data transmission and collects sensitive information.