Cyber Safety and Security

12345678910111213141516171819202122232425
Across
  1. 4. A crime where someone steals your personal information and uses it to commit fraud in your name.
  2. 5. A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
  3. 8. A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
  4. 10. Creations of the human mind, such as inventions or artistic works, that are legally protected.
  5. 13. Focuses on your right to control your personal information, including who collects it and how it's used.
  6. 16. Protecting digital data from unauthorized access, use, or disclosure.
  7. 19. The act of presenting someone else's work or ideas as one's own without proper citation.
  8. 22. Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
  9. 24. A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
  10. 25. A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
  1. 1. The trace of data you create as you navigate the online world, also called a "digital shadow".
  2. 2. Any illegal activity facilitated by electronic devices and the internet.
  3. 3. The use of electronic means to bully or harass another person, often through negative or false content.
  4. 6. Data deliberately provided by an individual through online activities, such as information submitted on forms.
  5. 7. Occurs when unauthorized individuals gain access to sensitive or confidential information.
  6. 9. Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
  7. 10. Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
  8. 11. Encoding data so it can only be decrypted and read by authorized parties.
  9. 12. Data collected automatically without intentional participation, like browsing history, often through cookies.
  10. 14. Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
  11. 15. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
  12. 17. Ensuring data is accessible only to authorized individuals or systems.
  13. 18. A legal right protecting original works of authorship like books, music, or computer programs.
  14. 20. Software used to detect and remove malicious programs from computer systems.
  15. 21. Malicious software used to harm or exploit a computer system, server, or network.
  16. 23. A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.