Across
- 4. Never share your _________ with another person
- 6. Also known as malicious software any; any program or file that is harmful to a computer user
- 7. Passwords should should always be at least this many characters long.
- 8. Choose a password that is easy for you _______________ but hard for you someone to guess.
- 10. Applied to data to protect it from unauthorized use in case of theft or loss.
- 12. A collection of information that is organized so that it can easily be accessed, managed and updated
- 14. Email scam or attempt to trick you into giving your password or personal information
Down
- 1. A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
- 2. _________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
- 3. Do not leave your laptop or computer ___________________
- 5. The state of being free from danger and threat
- 9. Always _______your computer when you leave your desk
- 10. To protect personal information, avoid sending it via
- 11. A _______ assessment is the process by which risks are identified and the impact of those risks determined
- 13. A software that is designed and destroy computer viruses
- 15. A ___________ is often an email that gets mailed in chain letter fashion describing something devastating.