Cybersecurity

12345678910111213141516171819202122232425262728293031323334
Across
  1. 5. Never list your ________ number or home address under contact information onlin.
  2. 6. special viruses that move from computer to computer without human action
  3. 10. You do not need to _________ for a copyright, it is automatic
  4. 12. Formal ways of giving credit to others for their work
  5. 13. ______ settings help control things like your Profile, Contact, and other Information relating to your account
  6. 15. Rules for interacting politely and responsibly online
  7. 16. The exclusive right to make copies, license, or otherwise use a creative work
  8. 17. A _______ password is one that contains at least 10 characters and several unique characters.
  9. 18. URLS that lead the user to download a virus or visit a harmful website
  10. 21. when online, using a _____ name helps protect your true identity
  11. 22. Your _______ device often contains more personal information that any other source
  12. 23. Bullying that takes place online
  13. 25. passwords that contain easy-to-guess information
  14. 28. When entering _______ information, be careful not to reveal personal details like you birthday or home address
  15. 29. Phishing is malware that asks for personal _______.
  16. 31. are used in conjunction with a screen name to help identify an online user without giving away personal details
  17. 32. The format most commonly used for citing sources in language, literature, and in K-12
  18. 34. Programs that appear to be useful but damage computers
Down
  1. 1. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  2. 2. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
  3. 3. Using someone else's work and passing it off as your own
  4. 4. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  5. 7. Information about you and what you do online
  6. 8. public _______ applies to works that are not copyrighted or have lost their copyright status due to age
  7. 9. programs or code that damage or destroy data by attaching to a program or file in a victim computer
  8. 11. people that stand up for others
  9. 14. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  10. 16. The ability to act in a safe and responsible way on the internet and other connected environments
  11. 18. Someone who intentionally targets people for harm using online chat rooms or social media
  12. 19. Software that protects computers from virus related harm
  13. 20. Secretly watches computer activity
  14. 24. Many features in online ________ can expose players to predators
  15. 26. ____ use allows limited use of copyrighted material for educational purposes
  16. 27. A detailed report, usually about a person
  17. 30. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
  18. 31. The format that is most commonly used in education and social sciences
  19. 33. Illegal ____ of copyrighted material is often referred to as piracy