Online teaching



To use this application you need to install and activate Adobe Flash Player


Get Adobe Flash player .













































































































Info Security

Author: mani Kausalya
Description:
Keywords: , , , , , , online teaching

Content:
Crossword hints:
Tapping confidential information from trash, The fraudulent acquisition and use of a person%27s private identifying information, usually for financial gain. (2 words), Records of IS activities, The front line of defence in information security!, Destruction of computer equipment or records, Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else., Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used, A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user%27s browsing patterns., A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus., Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital, Use this tool to dispose of documents that contain personal or financial information., In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don%27t, you probably won%27t be able to restore important files that you were working on., Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted., This can slow down your computer AND watch everywhere you go on the internet., You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________., The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.),

Crossword words:
SABOTAGE, DUMPSTERDIVING, WETWARE, HIPAA, IDENTITYTHEFT, HOAX, CONSENT, CYBERBULLYING, PASSWORD, KEYLOGGER, SHREDDER, SPYWARE, FIREWALL, AUDITTRAILS, BACKUP,
.