Across
- 2. data converted into a meaningful and useful context
- 4. malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
- 8. using the Internet for anything other than work tasks
- 9. includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
- 10. the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
- 12. pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- 13. to support with evidence or authority; to make more certain
- 14. a particular preference or point of view that is personal, rather than scientific.
- 17. malware that accesses or controls a device without being detected
- 18. a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
- 20. something that furnishes proof
- 23. the protection of information systems against unauthorized access (e.g., hacking, identity theft)
- 24. believable; reliable
- 25. a flaw or weakness that allows a threat agent to bypass security
- 26. a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
- 27. using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
- 28. a website that allows people of similar interests to interact and exchange information that is typically personal
Down
- 1. the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
- 3. connected with or related to the matter at hand
- 5. unbiased; neutral
- 6. using the Internet, ethically, for work-related tasks
- 7. a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
- 11. unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
- 15. the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
- 16. cyber attack that targets the server side to get customer information from the database, such as credit card numbers
- 19. book, article, person, or other resource consulted for information.
- 21. examine and judge carefully
- 22. attacks focused on the workplace Network workers access.
- 25. malware that spreads by users from an infected device to the rest of the devices on a network/system