Cybersecurity Lesson 3 & 4 Key Terms Crossword
Across
- 4. could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
- 8. is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
- 12. Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
- 14. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
- 15. is important for creating strong passwords.
- 17. exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
- 18. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
- 20. enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
- 1. works that are not copyrighted for any of a number of reasons.
- 2. is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
- 3. Fake e-mail message appearing to be from a trusted business, social network or other contact.
- 5. Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
- 6. is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- 7. is using someone else’s work and passing it off as your own.
- 9. keeping your personal information safe and personal.
- 10. protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
- 11. Programs that look useful, but actually cause damage to your computer.
- 13. downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
- 16. special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
- 19. URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
- 21. are formal ways of giving credit to people for their work.