CSCU Module 05 - Security on Social Networking Sites
Across
- 2. Controls that allow users to limit who can see their information or posts on social media.
- 4. A social engineering attack that tricks users into revealing sensitive information through fake messages or websites.
- 12. People who can see your public posts or updates on Twitter.
- 13. A short message shared publicly on Twitter.
- 14. A crime in which someone steals another person’s personal information to commit fraud or illegal acts.
- 15. A trick where attackers hide malicious links under legitimate buttons or videos to make users click them unknowingly.
- 16. A Facebook feature that lets you pick friends who can help you recover your account.
- 18. A private message sent between users on Twitter.
- 19. The section on Facebook showing your posts and activities over time.
Down
- 1. A hacking technique that uses fake website links that look similar to real ones.
- 3. Online platforms that allow people to connect, share information, and communicate digitally.
- 5. Notifications sent when an account is accessed from an unknown device or location.
- 6. Advertisements shown on social media based on your online interests.
- 7. A security feature that requires both a password and a verification code for login.
- 8. A browser or account setting that prevents websites from collecting your online activity data.
- 9. Manipulating people into revealing confidential information without using technical hacking.
- 10. A feature that prevents certain users from seeing your profile or contacting you.
- 11. A personal page on a social networking site containing user information such as name, photos, and interests.
- 17. Embedding location data such as latitude and longitude into photos or posts shared online.
- 20. Malicious software designed to harm or steal data from a computer or device.