Cyber Safety and Security
Across
- 4. A crime where someone steals your personal information and uses it to commit fraud in your name.
- 5. A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
- 8. A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
- 10. Creations of the human mind, such as inventions or artistic works, that are legally protected.
- 13. Focuses on your right to control your personal information, including who collects it and how it's used.
- 16. Protecting digital data from unauthorized access, use, or disclosure.
- 19. The act of presenting someone else's work or ideas as one's own without proper citation.
- 22. Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
- 24. A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
- 25. A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
- 1. The trace of data you create as you navigate the online world, also called a "digital shadow".
- 2. Any illegal activity facilitated by electronic devices and the internet.
- 3. The use of electronic means to bully or harass another person, often through negative or false content.
- 6. Data deliberately provided by an individual through online activities, such as information submitted on forms.
- 7. Occurs when unauthorized individuals gain access to sensitive or confidential information.
- 9. Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
- 10. Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
- 11. Encoding data so it can only be decrypted and read by authorized parties.
- 12. Data collected automatically without intentional participation, like browsing history, often through cookies.
- 14. Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
- 15. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- 17. Ensuring data is accessible only to authorized individuals or systems.
- 18. A legal right protecting original works of authorship like books, music, or computer programs.
- 20. Software used to detect and remove malicious programs from computer systems.
- 21. Malicious software used to harm or exploit a computer system, server, or network.
- 23. A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.