Digital Citizenship and Cyber Hygiene Vocabulary

12345678
Across
  1. 2. How companies use your data
  2. 4. Identity theft, stealing money, stealing private information, controlling private computers.
  3. 6. A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  4. 7. Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  5. 8. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
  1. 1. Protection of computer systems, networks, and data from digital attacks.
  2. 2. The information about a particular person that exists on the Internet as a result of their online activity.
  3. 3. A computer security specialist who breaks into protected systems and networks to test and assess their security
  4. 4. The use of electronic communication to bully a person
  5. 5. Legal document outlining how a company can collect and use your data