Across
- 1. When online, using a ______ name helps protect your true identity
- 4. Secretly watches computer activity
- 5. Software that protects computers from virus-related harm
- 7. Phishing is malware that asks for personal ___________
- 10. Someone who intentionally targets people for harm using online chat rooms or social media
- 13. Type of bullying that takes place online
- 14. Many features in online _____ can expose players to predators
- 17. Rules for interacting politely and responsibly online
- 18. Any program, website, or file that is designed to damage or gain unauthorized access to a device
- 20. Programs that appear to be useful but damage computers
- 22. A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
- 23. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- 24. ____ passwords contain easy-to-guess information
Down
- 1. Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
- 2. Programs or code that damage or destroy data by attaching to a program or file in a victim computer
- 3. URLs that mislead the user into downloading a virus or visiting a harmful website
- 6. Never list your _________ number or home address under contact information online
- 8. Illegal ___ of copyrighted material is often referred to as piracy
- 9. Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
- 11. Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
- 12. Your ______ device often contains more personal information than any other device
- 15. A password containing at least 10 characters and several unique characters could be described as ______
- 16. _______ settings help control things like your profile, contact, and other information relating to your account
- 19. A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
- 21. Social __________ describes sites or online communities where like-minded people can communicate with each other