Cybersecurity
Across
- 5. Never list your ________ number or home address under contact information onlin.
- 6. special viruses that move from computer to computer without human action
- 10. You do not need to _________ for a copyright, it is automatic
- 12. Formal ways of giving credit to others for their work
- 13. ______ settings help control things like your Profile, Contact, and other Information relating to your account
- 15. Rules for interacting politely and responsibly online
- 16. The exclusive right to make copies, license, or otherwise use a creative work
- 17. A _______ password is one that contains at least 10 characters and several unique characters.
- 18. URLS that lead the user to download a virus or visit a harmful website
- 21. when online, using a _____ name helps protect your true identity
- 22. Your _______ device often contains more personal information that any other source
- 23. Bullying that takes place online
- 25. passwords that contain easy-to-guess information
- 28. When entering _______ information, be careful not to reveal personal details like you birthday or home address
- 29. Phishing is malware that asks for personal _______.
- 31. are used in conjunction with a screen name to help identify an online user without giving away personal details
- 32. The format most commonly used for citing sources in language, literature, and in K-12
- 34. Programs that appear to be useful but damage computers
Down
- 1. Any program, website, or file that is designed to damage or gain unauthorized access to a device
- 2. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- 3. Using someone else's work and passing it off as your own
- 4. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- 7. Information about you and what you do online
- 8. public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- 9. programs or code that damage or destroy data by attaching to a program or file in a victim computer
- 11. people that stand up for others
- 14. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- 16. The ability to act in a safe and responsible way on the internet and other connected environments
- 18. Someone who intentionally targets people for harm using online chat rooms or social media
- 19. Software that protects computers from virus related harm
- 20. Secretly watches computer activity
- 24. Many features in online ________ can expose players to predators
- 26. ____ use allows limited use of copyrighted material for educational purposes
- 27. A detailed report, usually about a person
- 30. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- 31. The format that is most commonly used in education and social sciences
- 33. Illegal ____ of copyrighted material is often referred to as piracy