Security and Safety
Across
- 2. Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
- 4. Malicious computer code that reproduces itself on the same computer. Almost all viruses “infect” by inserting themselves into a computer file. When the file is opened, the virus is activated.
- 6. Malware that hides inside another program, often one downloaded from the web.
- 7. A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
- 10. A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
- 11. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
- 12. Attackers who are strongly motivated by principles or beliefs.
- 14. The process of sifting through big data to find the important questions that will yield fruitful results.
- 16. Bullying that takes place on technology devices using online social media platforms, public online forums, gaming sites, text messaging, or email
- 17. The security threat to a company that comes from its own employees, contractors, and business partners.
- 19. A technology used to verify a user’s identity and key that has been “signed” by a trusted third party
- 20. A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
- 21. Involves using someone’s personal information to commit financial fraud
Down
- 1. An individual who attacks a nation’s computer networks to cause disruption and panic among citizens.
- 3. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie
- 5. A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
- 8. An individual who wants to attack computers but lacks the knowledge of computers and networks needed to do so.
- 9. A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
- 13. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
- 15. Longer combination of letters, numbers, symbols
- 18. The process of “scrambling” information so it cannot be read unless the user possesses the “key” to unlock it (decryption)