Across
- 1. Extraneous messages sent on the internet to a large number of people, which can sometimes contain harmful programs.
- 4. Even your computer's _________ account should be locked and secured. If it is not locked, this allows anyone to be able to create an account on your computer and access crucial files.
- 7. Companies like Windows are always releasing new patches to make your security better; however, they can only work if you _________ them. It is smart to set Windows to automatically do this.
- 10. If you receive an e-mail from your bank saying they need your personal information to "update" their books or for other reasons, you should delete the e-mail and ________ your bank by phone.
- 12. A __________ software or hardware-based security system for your network that controls the traffic of importing and exporting data. It decides what to let though, and what to "burn".
- 15. Passwords should be __________ for each site used. Never use the same one for every site/account.
- 17. Protects your computer from programs that often operates without your permission.
- 19. _____________ from the internet when you are not using it to avoid threats from online.
- 21. When using protective software and other programs, it is vital to be sure these programs are __________ frequently.
- 22. The _________ you use should be secure. This is what is used to search for online websites, images, articles, etc.
Down
- 2. Your computers security programs may not pick up on some random ___________ or e-mail attachments, so be sure to ignore them because they can contain harmful software.
- 3. A software program that tracks what has been typed on your computer. It is smart to have anti-___________ software on your computer to help secure information.
- 5. Many locations like restaurants and cafes offer an open network for _________ use. Even though it is convenient, you should never trust these networks. Your computer is much more secure by using locked networks.
- 6. Since any system can be at risk to invasion, it is extremely important to back up your _______ on another device.
- 8. ___________ your computer when it is not in use. By doing this you make it a lot harder for online hackers and programs to find their way into your network.
- 9. Any software that is intrusive or hostile is considered ___________.
- 11. Always be aware of what you are ___________ and that it is safe. It is often used when wanting to transfer, copy, or take information.
- 13. Protective software used to secure your computer from malicious software, such as viruses.
- 14. Used to secure your computer and accounts. Should be 8 or more characters, and should have a combination of letters, numbers, and symbols.
- 16. Always be sure to make your home Wi-Fi connection __________ to avoid the scanning and hacking of your network/computer.
- 18. When dealing with important personal information online, always be sure to look for a ___________ emblem up by the browser address bar, or make sure that the address bar is green. This displays proof of the website being encrypted (secure).
- 20. Performs behaviors without your consent (advertising, collection of personal information, computer configuration changes).