Security

1234567891011121314151617181920
Across
  1. 5. A good password should contain symbols, numbers, uppercase and ____________letters
  2. 9. One should never follow links sent by _______________ or unknown sources
  3. 13. Before accessing an account one needs to enter a _________ and password
  4. 14. one of the first worms was called the ______ worm
  5. 17. Religion and medical records are considered ______________ information
  6. 19. Malware intended to steal important personal information
  7. 20. A copy of important data should be kept in an ________ location
Down
  1. 1. __________ in emails can contain viruses
  2. 2. A ____________ examines all the network traffic coming in and going out of your computer
  3. 3. A malicious software that spreads with the intention of corrupting or deleting files
  4. 4. __________ is the process of making an exact copy of the contents of a HD
  5. 6. The act of accessing another person's computer without permission
  6. 7. The Data ________ Act regulates the use of data for all businesses
  7. 8. There are 8/9 different _____________ in the DPA
  8. 10. A trojan appears to be __________ at first site
  9. 11. Passwords should always be kept ______
  10. 12. To protect yourself from malware you need to install an ____________
  11. 13. The only way to ensure you never get malware on your computer is to ______ the internet cable
  12. 15. The DPA states that business should ________ data once they no longer need it
  13. 16. Dropbox is an ___________ storage site
  14. 18. To prevent loss of data one needs to ___________ frequently