TEJ2O1 - Security and Ethics - D. French

1234567891011121314151617181920
Across
  1. 1. You should regularly make a ____ of your data/photos.
  2. 5. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  3. 6. If you download software, ____ it before running it.
  4. 11. Emails can spread malware, most often when you click links or open ____.
  5. 13. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  6. 16. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  7. 17. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  8. 18. Keep your operating system secure by running all the latest.
  9. 19. Malware that damages files on your computer or stops your computer from running properly.
  10. 20. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
  1. 2. Avoid making financial transactions on ____ networks or computers.
  2. 3. Tries to open security holes in your computer so a hacker can gain access.
  3. 4. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  4. 7. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  5. 8. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  6. 9. Make sure you use a different ____ for different sites and keep them long and complex.
  7. 10. Computer activities often leave a digital ____ that leads back to the offender.
  8. 12. When you copy sections of someone else's work and claim it is your own.
  9. 14. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  10. 15. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.