Across
- 1. sending an email, posting photos on a social media site and using your webcam
- 2. Media facebook and TikTok are types of ________
- 5. always _______your computer when you leave your desk
- 6. choose a password that is easy for you to ____________ but hard for you someone to guess
- 8. be cautious of plugging in these types of drives. Always scan them (acronym)
- 10. Engineering the art of manipulating people to get access to sensitive information
- 12. a fraudulent email purportedly from a reputable company attempting to get personal information
- 14. usually comprises the display device of the computer
- 16. the global system of interconnected computer networks that link billions of devices
Down
- 1. the address of a webpage. Check the validity of it before clicking on it (acronym)
- 2. irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc
- 3. a crime where a computer is used as a tool to commit an offense
- 4. a technology that allows us to access our files through the internet from anywhere in the world
- 7. harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction
- 9. physical or human characteristics that can be used to digitally identify a person and grant access to systems, devices or data
- 11. security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- 13. someone who seeks and exploits weaknesses in a computer system or computer network
- 15. Service Desk where do UTC employee report their ICT issues