Digital-Literacy-Kavon Stewart

1234567891011121314
Across
  1. 1. Spies on you, stealing information like passwords and credit card numbers
  2. 4. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  3. 5. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  4. 8. Keeps track of every key you type and sends it to the hacker.
  5. 11. IF someone is completely _______ they cant be traced.
  6. 12. Reads everyone’s data that is passing through a network. Usually on public WiFi.
  7. 14. A group of computers all being controlled by a remote hacker to perform illegal activity.
Down
  1. 2. Displays ads on your computer. May slow down your computer
  2. 3. Blocks you from accessing your files until you pay a ransom.
  3. 6. When someone gets your personal info and then does things pretending to be you.
  4. 7. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. 9. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. 10. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  7. 13. Something used to protect Against Viruses