Cybersecurity
Across
- 2. Special viruses that move from computer to computer without human action
- 6. Rules for interacting politely and responsibly online
- 8. programs or code that damage or destroy data by attaching to a program or file in a victim computer
- 15. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- 16. Programs that appear to be useful but damage computers
- 17. Software that protects computers from virus related harm
- 18. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- 19. The format that is most commonly used in education and social sciences
- 21. ______ settings help control things like your Profile, Contact, and other Information relating to your account
- 23. Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- 24. A detailed report, usually about a person
- 26. When online, using a _____ name helps protect your true identity
- 28. Secretly watches computer activity
- 30. Your _______ device often contains more personal information that any other source
- 31. The exclusive right to make copies, license, or otherwise use a creative work
- 33. Information about you and what you do online
- 34. Any program, website, or file that is designed to damage or gain unauthorized access to a device
- 35. Many features in online ________ can expose players to predators
Down
- 1. When entering _______ information, be careful not to reveal personal details like you birthday or home address
- 3. Someone who intentionally targets people for harm using online chat rooms or social media
- 4. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- 5. The ability to act in a safe and responsible way on the internet and other connected environments
- 7. You do not need to _________ for a copyright, it is automatic
- 9. Phishing is malware that asks for personal _______.
- 10. Illegal ____ of copyrighted material is often referred to as piracy
- 11. The format most commonly used for citing sources in language, literature, and in K-12
- 12. ____ use allows limited use of copyrighted material for educational purposes
- 13. Formal ways of giving credit to others for their work
- 14. people that stand up for others
- 18. Using someone else's work and passing it off as your own
- 20. Passwords that contain easy-to-guess information
- 21. Never list your ________ number or home address under contact information onlin.
- 22. Are used in conjunction with a screen name to help identify an online user without giving away personal details
- 25. A _______ password is one that contains at least 10 characters and several unique characters.
- 27. Bullying that takes place online
- 29. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- 32. URLS that lead the user to download a virus or visit a harmful website