Across
- 5. A trojan appears to be __________ at first site
- 7. There are 8/9 different _____________ in the DPA
- 8. of the first worms was called the ______ worm
- 10. A good password should contain symbols, numbers, uppercase and ____________letters
- 11. The only way to ensure you never get malware on your computer is to ______ the internet cable
- 12. __________ in emails can contain viruses
- 15. Religion and medical records are considered ______________ information
- 18. A ____________ examines all the network traffic coming in and going out of your computer
- 19. __________ is the process of making an exact copy of the contents of a HD
Down
- 1. Malware intended to steal important personal information
- 2. The DPA states that business should ________ data once they no longer need it
- 3. To prevent loss of data one needs to ___________ frequently
- 4. Before accessing an account one needs to enter a _________ and password
- 6. To protect yourself from malware you need to install an ____________
- 7. The Data ________ Act regulates the use of data for all businesses
- 9. A copy of important data should be kept in an ________ location
- 11. One should never follow links sent by _______________ or unknown sources
- 13. The act of accessing another person's computer without permission
- 14. Dropbox is an ___________ storage site
- 16. A malicious software that spreads with the intention of corrupting or deleting files
- 17. Passwords should always be kept ______
