Across
- 2. The process of converting data into a secure code to prevent unauthorized access.
- 4. A dishonest scheme to steal money or information.
- 8. A digital barrier designed to protect networks from unauthorized access.
- 10. The trail of data left behind by a person's online activity.
Down
- 1. Fraud involving the unauthorized use of someone's personal information.
- 3. Revealing too much personal information, especially online.
- 5. Using digital platforms to harm or intimidate others.
- 6. A model or prototype used to test or showcase a design concept.
- 7. Unauthorized access to a computer system or network.
- 9. Unwanted or irrelevant messages, often sent in bulk.
