Browsing Safely
Across
- 3. who commit crimes using the internet or computers.
- 4. list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
- 5. process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
- 7. list of approved or trusted websites, programs, or users that are allowed to access a system or network.
- 10. or junk messages, usually advertisements, sent over the internet, often in large amounts.
- 11. Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
- 12. files stored on your computer by websites to remember information about you, like login details or site preferences.
- 14. use of electronic communication to bully or harass someone, typically by sending threatening
- 15. software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
Down
- 1. activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
- 2. method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
- 6. Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
- 8. security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
- 9. that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
- 13. type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.