Internet in the Workplace

1234567891011121314
Across
  1. 2. Software designed to damage, destroy, or steal data.
  2. 5. The use of remote servers to store and access data over the internet instead of relying solely on a personal computer. Often used by remote companies but poses security risks, including hacking threats.
  3. 7. A program designed to negatively impact a computer system by infecting files.
  4. 8. Jobs that are completely work from home.
  5. 9. Similar to Trojan horses but with the ability to spread and infect other devices and computers.
  6. 10. The practice of examining and blocking or deleting online content considered inappropriate.
  7. 12. A set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks. Similar policies exist for school laptops.
  8. 13. Prevent unauthorized Internet surfing or access to specific websites during working hours.
  9. 14. The use of fraudulent emails and fake websites to trick individuals into providing sensitive data.
Down
  1. 1. A unique number used to identify an electronic device connected to the Internet.
  2. 3. Jobs that are partially remote, with some work done from home and some in an office.
  3. 4. Software that secretly monitors a user’s computer activity.
  4. 5. Bits of data stored on a computer that record website activity.
  5. 6. Malware disguised as useful or common applications to trick users into downloading it.
  6. 11. Illegally accessing or altering digital devices, software, or networks