Across
- 2. Internet-based platforms/applications that enable users to create, share, & interact with content in real time.
- 4. Try to discover weaknesses in programs so they can be fixed. They work directly with a company.
- 5. Also called Terms of Use – says what rights you have & what rights you give up when you use an app.
- 6. The practice of protecting systems from digital attacks, unauthorized access, damage, or disruption.
- 10. Can piece together data from computers and networks to find criminals.
- 12. Personally Identifiable Information (Name, Birth Date, Address, Social Security Number, Email Address or Password.)
- 13. A system of interconnected computing devices (computers, servers, printers, and mobile devices)
- 19. The process cell phone companies use to know the location of your devices.
- 21. Computer skills whiz who uses their expertise to gain unauthorized access to systems, networks, or data.
- 22. Everything you do online creates a trail of info. (Internet Searches, Online Shopping, Social Media Posts)
- 24. Artificial Intelligence
- 25. Images, videos, or audio created using AI
- 26. Malicious software (malware) that, when executed, replicates itself by modifying code in other programs. Can spy.
Down
- 1. Uses a combination of Law Enforcement and Tech Knowledge to solve crimes.
- 3. Refers to any illegal activity that involves computers, networks, or digital devices.
- 7. Same as Penetration Testers, but they typically work within a consulting company for many businesses.
- 8. Hardware, software, networks, and digital data
- 9. Contain info of all the tasks a digital device does – like which device, when, and who was logged in.
- 11. Acronym for World Wide Web
- 14. Writes encryption programs companies use to protect their data.
- 15. Digital devices you use collect data about what you’ve done (send an email/text, create a doc, take a pic)
- 16. Same as Penetration Testers and Ethical Hackers, but they watch for hacking being done in real time.
- 17. Designers of Cybersecurity Systems.
- 18. Deliberate/malicious attempt to breach, damage, disrupt, or gain access to networks or digital devices.
- 20. A cyberattack using deceptive methods (via email, text, calls, or fake websites) to trick people into revealing PII.
- 23. Synthetic media mimicking real people, making it appear as if someone said/did something they never did.
