Cybersecurity

123456789101112131415161718192021222324
Across
  1. 1. When online, using a ______ name helps protect your true identity
  2. 4. Secretly watches computer activity
  3. 5. Software that protects computers from virus-related harm
  4. 7. Phishing is malware that asks for personal ___________
  5. 10. Someone who intentionally targets people for harm using online chat rooms or social media
  6. 13. Type of bullying that takes place online
  7. 14. Many features in online _____ can expose players to predators
  8. 17. Rules for interacting politely and responsibly online
  9. 18. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  10. 20. Programs that appear to be useful but damage computers
  11. 22. A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
  12. 23. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  13. 24. ____ passwords contain easy-to-guess information
Down
  1. 1. Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
  2. 2. Programs or code that damage or destroy data by attaching to a program or file in a victim computer
  3. 3. URLs that mislead the user into downloading a virus or visiting a harmful website
  4. 6. Never list your _________ number or home address under contact information online
  5. 8. Illegal ___ of copyrighted material is often referred to as piracy
  6. 9. Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
  7. 11. Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
  8. 12. Your ______ device often contains more personal information than any other device
  9. 15. A password containing at least 10 characters and several unique characters could be described as ______
  10. 16. _______ settings help control things like your profile, contact, and other information relating to your account
  11. 19. A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
  12. 21. Social __________ describes sites or online communities where like-minded people can communicate with each other