Across
- 1. Information a company needs to keep private to protect from theft.
- 3. Illegally accessing or altering digital devices, software, or networks.
- 5. Prevents your browser from showing ads that can contain malware.
- 6. Work created by company employees on the job that is owned by that company.
- 9. Malware disguised to appear as a useful or common application.
- 12. Appropriate behavior in a business setting, such as respecting property and time.
- 14. Bits of data stored on your computer that record visited websites.
- 18. Identifies the manner in which employees should behave while at work.
- 20. A number used to identify an electronic device connected to the Internet.
- 21. Tools that prevent unauthorized Internet surfing or visiting selected websites.
- 22. Software that spies on a computer to capture private info like passwords.
- 23. Overstating features and benefits of products or making false claims.
- 24. Rules and standards for using company-owned equipment and networks.
- 25. Stealing physical mail to commit identity theft.
Down
- 2. Applying ethics to messages to make sure all communication is honest.
- 4. Use of fraudulent emails to trick people into providing private data.
- 7. Software programs intended to damage, destroy, or steal data.
- 8. Software referred to as antivirus or antimalware.
- 10. Malware similar to Trojans that can self-replicate to infect other devices.
- 11. A document that dictates how business should be conducted.
- 13. Specific information about a company is never shared without clearance.
- 15. Stealing personal information to commit theft or fraud.
- 16. Behaving with sensitivity to social, environmental, and economic issues.
- 17. Program designed to negatively impact a system by infecting other files.
- 19. Examining and blocking or deleting material considered inappropriate.
