Across
- 1. The process of documenting and communicating security incidents to the appropriate personnel or authorities.
- 3. Programs installed without your explicit consent. Spyware can remotely control your computer or collect your personal information and send it to a third party.
- 5. Someone who sends mass amounts of unsolicited commercial emails.
- 6. A hyperlink that leads to harmful websites, often used in phishing attacks.
- 11. A strong password that is difficult to guess, typically containing a mix of letters, numbers, and special characters.
- 13. A file sent along with an email message.
- 15. The process of confirming a person's identity, often used in financial transactions and account setups.
- 17. Procedures used to regain access to an online account after being locked out, often involving security questions or email verification.
- 18. Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections.
- 21. The practices and settings that control the visibility of personal information shared on social media platforms.
Down
- 1. The unauthorized use of someone’s personal information, typically for financial gain.
- 2. The process of converting data into a coded format to prevent unauthorized access.
- 3. Manipulative tactics used by attackers to trick individuals into divulging confidential information.
- 4. Software that spreads from computer to computer and damages files or disrupts your system.
- 7. A situation where a hacker gains unauthorized access to a user's account, often through stolen credentials.
- 8. The trail of data that individuals leave online through their activities, including social media, browsing, and online purchases.
- 9. Spam or a pop-up message to lure personal and financial information from unsuspecting victims.
- 10. Computer code that is placed on a hard drive when Internet users go to websites and allow the sites to identify the computer if it returns to the site.
- 12. A statement that explains how an organization collects, uses, and protects user data.
- 14. A method of data transmission where only the communicating users can read the messages, preventing access by intermediaries.
- 16. A wireless network that is protected with strong encryption protocols, like WPA3, to prevent unauthorized access.
- 19. Unsolicited commercial email. There are two types of spam, legal and illegal. The subject line is considered legally deceptive if it has a tendency or capacity to deceive consumers.
- 20. A person who uses the Internet to access computers and information without permission.
