Computer Security and Ethics
Across
- 2. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- 4. Make sure you use a different ____ for different sites and keep them long and complex.
- 7. Computer activities often leave a digital ____ that leads back to the offender.
- 8. You should regularly make a ____ of your data/photos.
- 12. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- 13. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- 15. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
- 17. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
- 18. To protect your device from malware, you should install reputable ____ software and run frequent scans.
- 19. If you download software, ____ it before running it.
Down
- 1. Malware that damages files on your computer or stops your computer from running properly.
- 3. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- 4. When you copy sections of someone else's work and claim it is your own.
- 5. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- 6. Emails can spread malware, most often when you click links or open ____.
- 9. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- 10. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- 11. Keep your operating system secure by running all the latest.
- 14. Avoid making financial transactions on ____ networks or computers.
- 16. Tries to open security holes in your computer so a hacker can gain access.