Securing Your Computer

12345678910111213141516171819202122
Across
  1. 1. Extraneous messages sent on the internet to a large number of people, which can sometimes contain harmful programs.
  2. 4. Even your computer's _________ account should be locked and secured. If it is not locked, this allows anyone to be able to create an account on your computer and access crucial files.
  3. 7. Companies like Windows are always releasing new patches to make your security better; however, they can only work if you _________ them. It is smart to set Windows to automatically do this.
  4. 10. If you receive an e-mail from your bank saying they need your personal information to "update" their books or for other reasons, you should delete the e-mail and ________ your bank by phone.
  5. 12. A __________ software or hardware-based security system for your network that controls the traffic of importing and exporting data. It decides what to let though, and what to "burn".
  6. 15. Passwords should be __________ for each site used. Never use the same one for every site/account.
  7. 17. Protects your computer from programs that often operates without your permission.
  8. 19. _____________ from the internet when you are not using it to avoid threats from online.
  9. 21. When using protective software and other programs, it is vital to be sure these programs are __________ frequently.
  10. 22. The _________ you use should be secure. This is what is used to search for online websites, images, articles, etc.
Down
  1. 2. Your computers security programs may not pick up on some random ___________ or e-mail attachments, so be sure to ignore them because they can contain harmful software.
  2. 3. A software program that tracks what has been typed on your computer. It is smart to have anti-___________ software on your computer to help secure information.
  3. 5. Many locations like restaurants and cafes offer an open network for _________ use. Even though it is convenient, you should never trust these networks. Your computer is much more secure by using locked networks.
  4. 6. Since any system can be at risk to invasion, it is extremely important to back up your _______ on another device.
  5. 8. ___________ your computer when it is not in use. By doing this you make it a lot harder for online hackers and programs to find their way into your network.
  6. 9. Any software that is intrusive or hostile is considered ___________.
  7. 11. Always be aware of what you are ___________ and that it is safe. It is often used when wanting to transfer, copy, or take information.
  8. 13. Protective software used to secure your computer from malicious software, such as viruses.
  9. 14. Used to secure your computer and accounts. Should be 8 or more characters, and should have a combination of letters, numbers, and symbols.
  10. 16. Always be sure to make your home Wi-Fi connection __________ to avoid the scanning and hacking of your network/computer.
  11. 18. When dealing with important personal information online, always be sure to look for a ___________ emblem up by the browser address bar, or make sure that the address bar is green. This displays proof of the website being encrypted (secure).
  12. 20. Performs behaviors without your consent (advertising, collection of personal information, computer configuration changes).