My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Digital Security and Privacy

Horizontales
One of the most common natural threats. can damage the major components of the computer.
A device used to protect a computer from electrical surges.
Unwanted and unsolicited email.
To make a copy of your important information or data in a secure place.
The product of a persons imagination and creativity, such as art, music, books, inventions, etc.
Using someone else's work, and claiming it as your own
Protection of your personal information and data.
A person who uses an online presence to prey on the weak and unsuspecting. Generally the young and elderly.
A program used to spy, steal, or damage your information or computer.
Verticales
A person who breaks into computer systems for various reasons.
One of the most important measures that can be used to keep your information secure.
When a person tries to get your personal information through trickery , generally through email.
Threat that are environmental in nature. These can include fire, water, and electricity.
Laws enacted to protect a persons rights to their intellectual privacy.
The intentional harming of a persons reputation.
Protection of computer systems from theft and damage.
Deleting a registry file is an example of _______.
Written defamation
Copyright violations can result in jail time or a ____.
Spoken defamation