Cybersecurity

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 2. Special viruses that move from computer to computer without human action
  2. 6. Rules for interacting politely and responsibly online
  3. 8. programs or code that damage or destroy data by attaching to a program or file in a victim computer
  4. 15. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
  5. 16. Programs that appear to be useful but damage computers
  6. 17. Software that protects computers from virus related harm
  7. 18. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  8. 19. The format that is most commonly used in education and social sciences
  9. 21. ______ settings help control things like your Profile, Contact, and other Information relating to your account
  10. 23. Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
  11. 24. A detailed report, usually about a person
  12. 26. When online, using a _____ name helps protect your true identity
  13. 28. Secretly watches computer activity
  14. 30. Your _______ device often contains more personal information that any other source
  15. 31. The exclusive right to make copies, license, or otherwise use a creative work
  16. 33. Information about you and what you do online
  17. 34. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  18. 35. Many features in online ________ can expose players to predators
Down
  1. 1. When entering _______ information, be careful not to reveal personal details like you birthday or home address
  2. 3. Someone who intentionally targets people for harm using online chat rooms or social media
  3. 4. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
  4. 5. The ability to act in a safe and responsible way on the internet and other connected environments
  5. 7. You do not need to _________ for a copyright, it is automatic
  6. 9. Phishing is malware that asks for personal _______.
  7. 10. Illegal ____ of copyrighted material is often referred to as piracy
  8. 11. The format most commonly used for citing sources in language, literature, and in K-12
  9. 12. ____ use allows limited use of copyrighted material for educational purposes
  10. 13. Formal ways of giving credit to others for their work
  11. 14. people that stand up for others
  12. 18. Using someone else's work and passing it off as your own
  13. 20. Passwords that contain easy-to-guess information
  14. 21. Never list your ________ number or home address under contact information onlin.
  15. 22. Are used in conjunction with a screen name to help identify an online user without giving away personal details
  16. 25. A _______ password is one that contains at least 10 characters and several unique characters.
  17. 27. Bullying that takes place online
  18. 29. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  19. 32. URLS that lead the user to download a virus or visit a harmful website