Across
- 5. A good password should contain symbols, numbers, uppercase and ____________letters
- 9. One should never follow links sent by _______________ or unknown sources
- 13. Before accessing an account one needs to enter a _________ and password
- 14. one of the first worms was called the ______ worm
- 17. Religion and medical records are considered ______________ information
- 19. Malware intended to steal important personal information
- 20. A copy of important data should be kept in an ________ location
Down
- 1. __________ in emails can contain viruses
- 2. A ____________ examines all the network traffic coming in and going out of your computer
- 3. A malicious software that spreads with the intention of corrupting or deleting files
- 4. __________ is the process of making an exact copy of the contents of a HD
- 6. The act of accessing another person's computer without permission
- 7. The Data ________ Act regulates the use of data for all businesses
- 8. There are 8/9 different _____________ in the DPA
- 10. A trojan appears to be __________ at first site
- 11. Passwords should always be kept ______
- 12. To protect yourself from malware you need to install an ____________
- 13. The only way to ensure you never get malware on your computer is to ______ the internet cable
- 15. The DPA states that business should ________ data once they no longer need it
- 16. Dropbox is an ___________ storage site
- 18. To prevent loss of data one needs to ___________ frequently
