Chapter 3.2 Crossword

12345678910111213141516171819202122232425
Across
  1. 1. Information a company needs to keep private to protect from theft.
  2. 3. Illegally accessing or altering digital devices, software, or networks.
  3. 5. Prevents your browser from showing ads that can contain malware.
  4. 6. Work created by company employees on the job that is owned by that company.
  5. 9. Malware disguised to appear as a useful or common application.
  6. 12. Appropriate behavior in a business setting, such as respecting property and time.
  7. 14. Bits of data stored on your computer that record visited websites.
  8. 18. Identifies the manner in which employees should behave while at work.
  9. 20. A number used to identify an electronic device connected to the Internet.
  10. 21. Tools that prevent unauthorized Internet surfing or visiting selected websites.
  11. 22. Software that spies on a computer to capture private info like passwords.
  12. 23. Overstating features and benefits of products or making false claims.
  13. 24. Rules and standards for using company-owned equipment and networks.
  14. 25. Stealing physical mail to commit identity theft.
Down
  1. 2. Applying ethics to messages to make sure all communication is honest.
  2. 4. Use of fraudulent emails to trick people into providing private data.
  3. 7. Software programs intended to damage, destroy, or steal data.
  4. 8. Software referred to as antivirus or antimalware.
  5. 10. Malware similar to Trojans that can self-replicate to infect other devices.
  6. 11. A document that dictates how business should be conducted.
  7. 13. Specific information about a company is never shared without clearance.
  8. 15. Stealing personal information to commit theft or fraud.
  9. 16. Behaving with sensitivity to social, environmental, and economic issues.
  10. 17. Program designed to negatively impact a system by infecting other files.
  11. 19. Examining and blocking or deleting material considered inappropriate.