Security and Safety

123456789101112131415161718192021
Across
  1. 2. Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
  2. 4. Malicious computer code that reproduces itself on the same computer. Almost all viruses “infect” by inserting themselves into a computer file. When the file is opened, the virus is activated.
  3. 6. Malware that hides inside another program, often one downloaded from the web.
  4. 7. A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
  5. 10. A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
  6. 11. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
  7. 12. Attackers who are strongly motivated by principles or beliefs.
  8. 14. The process of sifting through big data to find the important questions that will yield fruitful results.
  9. 16. Bullying that takes place on technology devices using online social media platforms, public online forums, gaming sites, text messaging, or email
  10. 17. The security threat to a company that comes from its own employees, contractors, and business partners.
  11. 19. A technology used to verify a user’s identity and key that has been “signed” by a trusted third party
  12. 20. A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
  13. 21. Involves using someone’s personal information to commit financial fraud
Down
  1. 1. An individual who attacks a nation’s computer networks to cause disruption and panic among citizens.
  2. 3. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie
  3. 5. A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
  4. 8. An individual who wants to attack computers but lacks the knowledge of computers and networks needed to do so.
  5. 9. A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
  6. 13. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
  7. 15. Longer combination of letters, numbers, symbols
  8. 18. The process of “scrambling” information so it cannot be read unless the user possesses the “key” to unlock it (decryption)