Digital Literacy - zara
Across
- 3. A group of computers all being controlled by a remote hacker to perform illegal activity. Get it by hackers exploiting security holes especially if you don’t do windows updates and antivirus software.
- 6. Usually in an email. Tries to trick you into telling your passwords or credit card info. Can link you to fake sites that look like real sites and ask you to log in, but steals your info. Comes by email or phone. Just don’t trust people.
- 7. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it. Almost anyone can be targeted.
- 8. If you think any of these are suspicious, delete them and do not open them
- 12. It is forever
- 14. Make sure these are strong and different for every site
- 17. Keeps track of every key you type and sends it to the hacker. You’re vulnerable to it any time you use a public computer. Also same way as getting other malware, it could be installed on your own computer.
- 18. Displays ads on your computer. May slow down your computer, use internet bandwidth, make you exceed data caps. Usually get it by clicking on ads online. May come bundled with other software.
Down
- 1. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files.
- 2. Be careful when installing this when you have this downloaded. Pre-scan it. If it is a hacked version, remember that if they could hack the security of that software, they can probably also add code to hack the security of your computer.
- 4. Make sure your computer has the latest one of these
- 5. When someone gets your personal info (like username/pwd/bank info etc) and then does things pretending to be you. (ex. access your files/friends/bank, steal your stuff, do illegal activities as you).
- 9. Blocks you from accessing your files until you pay a ransom. Get it by hackers exploiting weaknesses in your security, especially if you don’t have windows updates and antivirus software.
- 10. Is the use of technology to harass, threaten, embarrass, or target another person
- 11. Reads everyone’s data that is passing through a network. Usually on public WiFi. Can steal your passwords. You’re mostly vulnerable when using public wifi.
- 13. Like the Trojan Horse. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer. Get it from downloading things you think are good.
- 15. Spreads through networks and emails infecting as many computers as possible. Can carry a virus, trojan or other malware. Get it through email.
- 16. Spies on you, stealing information like passwords and credit card numbers. It sometimes comes bundled with other software or freeware. Or get it from opening links and email attachments from questionable sources. Can also infect computers without the latest updates.