Across
- 1. You should never use your ____'s name as a password
- 4. You should have a unique password for every single online ________
- 6. Identity theft, financial fraud, stalking, bullying, criminal hacking, email spoofing and piracy are all types of this.
- 9. Viruses, Trojans and key loggers are all types of this.
- 10. Information security isn’t just cyber! It also includes people and ________
- 11. Mobile apps ask for these when you install them
- 12. 99% of these people are not criminals, but the 1% that are have made a bad name for them
- 14. You should always use a VPN when using public _____
- 16. A type of malware that has the ability to record every keystroke
- 18. Treat your passwords like this household item; never share them, use a good one, and change them regularly.
- 19. Someone else’s computer.
- 20. Make sure you have this in case of disaster.
- 23. Information security is _____ responsibility!
- 24. What happens online stays online because the internet is _______
- 25. This included pieces of identifiable information such as your full name, home address, phone number, drivers license number, etc.
- 26. Think before you ______
- 27. Illegally downloading software, music and movies.
- 28. Don't connect with _______ or people you don’t know in real life
Down
- 2. This contains the exact location of where a photo was taken.
- 3. These should be strong, long and complex.
- 5. It's exciting to turn 16 and get this, but NEVER post photos of this piece of plastic online (2 words).
- 7. Passwords are private, so never do this with them.
- 8. These types of emails often have bad spelling and grammar, and convey a false sense of urgency.
- 13. Strong passwords include letters, numbers and ______.
- 15. Bad guys can use this to find you in real life, so never give out ________ information online.
- 17. See______? Say ________!
- 18. Every ____ seconds someone's identity is stolen!
- 21. You should only download official versions of these and only with your parents' permission.
- 22. Never be afraid to ask your _______ for help. Also tell them if you’re being cyberbullied or know someone who is.
- 24. Use two-_______ authentication whenever it's offered.
- 29. When in doubt, ___!
