Cybersecurity Lesson 3 & 4 Key Terms Crossword

123456789101112131415161718192021
Across
  1. 4. could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
  2. 8. is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
  3. 12. Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
  4. 14. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
  5. 15. is important for creating strong passwords.
  6. 17. exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
  7. 18. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
  8. 20. enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
  1. 1. works that are not copyrighted for any of a number of reasons.
  2. 2. is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  3. 3. Fake e-mail message appearing to be from a trusted business, social network or other contact.
  4. 5. Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
  5. 6. is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
  6. 7. is using someone else’s work and passing it off as your own.
  7. 9. keeping your personal information safe and personal.
  8. 10. protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
  9. 11. Programs that look useful, but actually cause damage to your computer.
  10. 13. downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
  11. 16. special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
  12. 19. URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
  13. 21. are formal ways of giving credit to people for their work.