Computer Security and Ethics

12345678910111213141516171819
Across
  1. 2. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  2. 4. Make sure you use a different ____ for different sites and keep them long and complex.
  3. 7. Computer activities often leave a digital ____ that leads back to the offender.
  4. 8. You should regularly make a ____ of your data/photos.
  5. 12. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  6. 13. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  7. 15. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
  8. 17. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
  9. 18. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  10. 19. If you download software, ____ it before running it.
Down
  1. 1. Malware that damages files on your computer or stops your computer from running properly.
  2. 3. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  3. 4. When you copy sections of someone else's work and claim it is your own.
  4. 5. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  5. 6. Emails can spread malware, most often when you click links or open ____.
  6. 9. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  7. 10. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  8. 11. Keep your operating system secure by running all the latest.
  9. 14. Avoid making financial transactions on ____ networks or computers.
  10. 16. Tries to open security holes in your computer so a hacker can gain access.