Digital Literacy-Kavon

1234567891011121314
Across
  1. 3. Blocks you from accessing your files until you pay a ransom.
  2. 4. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  3. 7. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  4. 8. Spies on you, stealing information like passwords and credit card numbers
  5. 9. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. 11. Keeps track of every key you type and sends it to the hacker.
  7. 12. Something used to protect Against Viruses
  8. 14. Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
  1. 1. Displays ads on your computer. May slow down your computer
  2. 2. IF someone is completely _______ they cant be traced.
  3. 5. When someone gets your personal info and then does things pretending to be you.
  4. 6. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. 10. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  6. 13. A group of computers all being controlled by a remote hacker to perform illegal activity.