Across
- 3. someone pretending to be someone,such as your boss, friend etc.. sends a email intending to gain money or information from a fake email address.
- 7. Applied to data to protect it from unauthorized use in case of theft or loss.
- 9. electronic device for storing an processing data
- 12. Choose a password that is easy for you to _____but hard for someone to guess.
- 15. Cybersecurity is a shared ________
- 18. it IS VERY IMPORTANT to use strong privacy settings on ________.
- 19. These devices are used to direct information between public and private networks
Down
- 1. is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's identity
- 2. ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK
- 4. DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.
- 5. system of interrelated,internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
- 6. Device that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- 8. _____is an attempt by an individual or group to trick you into giving personal information by employing social engineering techniques through email.
- 10. An option you can use to protect your credit.
- 11. networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- 13. Technology used to connect to a public network through a secure tunnel.
- 14. ____Uses cellphone text messages to induce people to divulge their personal information
- 16. ROVER12345 would be a bad example of a _____
- 17. For a password to be secure, it should contain upper and lower case letters,numbers and ______.