Across
- 2. Monitoring web activity for ads.
- 3. Dual-step login for added security.
- 4. Unauthorized release of private info.
- 8. Redirecting traffic to malicious sites.
- 9. Stealing info for fraudulent purposes.
- 13. Virtual private network for secure browsing.
- 15. Harassment/intimidation behavior online.
- 17. coding for utmost security.
- 19. Cautious online behavior to avoid risks.
- 22. Programs combating malware infections.
- 23. Complex code to protect accounts.
- 24. Manipulating to access sensitive data.
Down
- 1. Restricting location data sharing.
- 5. Regular maintenance of online security.
- 6. Regularly saving data to prevent loss.
- 7. Security barrier blocking unauthorized access.
- 8. Deceptive emails/websites aiming to steal info.
- 10. Protecting identifiable personal info.
- 11. Harmful software harming devices/data.
- 12. Fixes for software security vulnerabilities.
- 14. Fraudulent schemes for financial gain.
- 16. Controls limiting shared personal info.
- 18. Coding data to prevent unauthorized reading.
- 20. Securely locking devices to deter access.
- 21. Online traces revealing user activities.