Cybersecurity Lesson 1 & 2 Key Terms
Across
- 4. is exchange of suggestive messages or images via mobile phone texting.
- 6. many social networking web sites require you to set up.
- 8. are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
- 10. is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
- 11. someone who intentionally targets people for harm using online chat rooms or social media.
- 12. is a detailed report, usually about a person.
- 15. people online that often try to obtain information about you.
- 16. is bullying that takes place using electronic technology.
- 17. on the internet is a technical measure intended to restrict access to information.
Down
- 1. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
- 2. is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
- 3. can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
- 5. keeping your personal information safe and personal.
- 7. is the action of subjecting someone to aggressive pressure or intimidation.
- 9. is the ability to act in a safe and responsible way on the internet and other connected environments.
- 13. where you connect with other players and can chat with them either by voice or by text.
- 14. a person who witness someone getting bullied but does nothing to stop it.