Cybersecurity

12345678910111213141516171819202122232425262728293031323334
Across
  1. 2. Using someone else's work and passing it off as your own
  2. 5. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
  3. 6. people that stand up for others
  4. 8. Never list your ________ number or home address under contact information onlin.
  5. 13. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. 14. The ability to act in a safe and responsible way on the internet and other connected environments
  7. 17. A detailed report, usually about a person
  8. 18. Rules for interacting politely and responsibly online
  9. 20. Formal ways of giving credit to others for their work
  10. 23. Someone who intentionally targets people for harm using online chat rooms or social media
  11. 25. passwords that contain easy-to-guess information
  12. 26. programs or code that damage or destroy data by attaching to a program or file in a victim computer
  13. 28. Phishing is malware that asks for personal _______.
  14. 31. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  15. 32. ______ settings help control things like your Profile, Contact, and other Information relating to your account
  16. 33. Many features in online ________ can expose players to predators
Down
  1. 1. public _______ applies to works that are not copyrighted or have lost their copyright status due to age
  2. 3. Secretly watches computer activity
  3. 4. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  4. 7. Software that protects computers from virus related harm
  5. 8. When entering _______ information, be careful not to reveal personal details like you birthday or home address
  6. 9. The exclusive right to make copies, license, or otherwise use a creative work
  7. 10. Information about you and what you do online
  8. 11. The format most commonly used for citing sources in language, literature, and in K-12
  9. 12. A _______ password is one that contains at least 10 characters and several unique characters.
  10. 15. ____ use allows limited use of copyrighted material for educational purposes
  11. 16. Illegal ____ of copyrighted material is often referred to as piracy
  12. 19. Programs that appear to be useful but damage computers
  13. 20. Bullying that takes place online
  14. 21. are used in conjunction with a screen name to help identify an online user without giving away personal details
  15. 22. Your _______ device often contains more personal information that any other source
  16. 24. You do not need to _________ for a copyright, it is automatic
  17. 25. special viruses that move from computer to computer without human action
  18. 27. when online, using a _____ name helps protect your true identity
  19. 29. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
  20. 30. URLS that lead the user to download a virus or visit a harmful website
  21. 34. The format that is most commonly used in education and social sciences