Online Safety

12345678910111213141516
Across
  1. 3. – Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action.
  2. 8. – Criminal acts using computers, networks and/or the Internet
  3. 9. – Software that has advertisements embedded into the program
  4. 10. – Software that detects and removes spyware from a computer
  5. 15. – Malware that locks a computer system or encrypts computer files until a “ransom” fee is paid
  6. 16. – Electronic junk mail
Down
  1. 1. Forensics – Investigation and analysis techniques that gather and preserve data from a computing device
  2. 2. Theft – All types of crime in which someone obtains and uses another person’s personal data in a way that involves fraud or deception, typically for economic gain
  3. 4. – Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer
  4. 5. – Person who uses the Internet to access personal or business computers without permission
  5. 6. – A variation of phishing using SMS (short message service) to send misleading text messages
  6. 7. – Short for “malicious software;” includes viruses and spyware that steal personal information, send spam and commit fraud
  7. 11. – Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft
  8. 12. – A subclass of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times
  9. 13. – Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data
  10. 14. logger or keylogger – Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to ensure computer use is work-related)