Across
- 6. The process of copying files from a computer’s hard drive to be stored in a remote location.
- 10. The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.
- 11. Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.
- 15. A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
- 16. A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.
- 17. A device that maintains power to computer equipment in case of an interruption in the primary electrical source.
- 18. An attack that changes the device’s address so that data is sent to the attacker’s computer.
- 21. The process of unlocking encrypted information back into a readable format.
- 23. Attackers who are strongly motivated by principles or beliefs.
- 25. The security threat to a company that comes from its own employees, contractors, and business partners.
- 29. A category of attacks that attempts to trick the victim into giving valuable information to the attacker.
- 30. The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
- 31. A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
- 32. A security method of “scrambling” information as it is transmitted over a network.
- 33. Aches and pains associated with repeated and long-term usage of the devices.
- 35. A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
- 36. Government-sponsored attacker that launches computer attacks against their enemies.
- 37. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
- 38. Malware that hides inside another program, often one downloaded from the web.
- 40. An individual who attacks a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.
Down
- 1. In Computer Concepts, malicious computer code that reproduces itself on the same computer.
- 2. An individual who launches attacks against other users and their computers, also known as a threat actor.
- 3. A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
- 4. A way to verify your identity based on physical characteristics.
- 5. A method that combines multiple types of authentication to increase security.
- 7. Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.
- 8. In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
- 9. The state or condition of being free from public attention to the degree that you determine.
- 12. An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
- 13. An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so.
- 14. A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
- 19. Code attached to a file that verifies the identity of the creator of the file.
- 20. This central connection device needed for a home-based Wi-Fi network.
- 22. The process of sifting through big data to find the important questions that will yield fruitful results.
- 24. A wireless data network technology that provides high-speed data connections that do not require a physical connection.
- 26. In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length.
- 27. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
- 28. A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).
- 34. Using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
- 39. Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email.
