Across
- 2. Software designed to damage, destroy, or steal data.
- 5. The use of remote servers to store and access data over the internet instead of relying solely on a personal computer. Often used by remote companies but poses security risks, including hacking threats.
- 7. A program designed to negatively impact a computer system by infecting files.
- 8. Jobs that are completely work from home.
- 9. Similar to Trojan horses but with the ability to spread and infect other devices and computers.
- 10. The practice of examining and blocking or deleting online content considered inappropriate.
- 12. A set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks. Similar policies exist for school laptops.
- 13. Prevent unauthorized Internet surfing or access to specific websites during working hours.
- 14. The use of fraudulent emails and fake websites to trick individuals into providing sensitive data.
Down
- 1. A unique number used to identify an electronic device connected to the Internet.
- 3. Jobs that are partially remote, with some work done from home and some in an office.
- 4. Software that secretly monitors a user’s computer activity.
- 5. Bits of data stored on a computer that record website activity.
- 6. Malware disguised as useful or common applications to trick users into downloading it.
- 11. Illegally accessing or altering digital devices, software, or networks
