Cybersecurity Terms and Definitions
Across
- 5. Connection between a computer and a modem on radio frequencies that allows accessing the internet without being connected to wires
- 7. A website or program that allows users to talk with lots of people at once, like texting on the internet instead of the phone
- 10. Code or software that can replicate itself, is usually sent through email attachments and can damage computers and hard drives
- 13. Using the internet to send a copy of a file from one website, system, program, computer or device to another
- 15. A program that runs on a computer
- 17. Physical computer equipment and related machines and parts
- 19. Software put on a computer to spy and collect and send information to cybercriminals
- 21. An online record of all the websites a user visits and the emails a user sends, which can stay even after deleting their browser history and emails
- 23. Letters and messages sent from one computer or device to another computer or device
- 25. Malicious software or code used to steal information and damage devices
Down
- 1. Software that tries to stop viruses or malware from attacking a computer or other device
- 2. A small packet of software that lets a website or browser track users by storing some of their information, such as what clothing online shoppers like
- 3. Anything done to protect computers, devices and software from cybercrimes
- 4. Websites that allow users to post comments and have conversations with other users, for example, in online classes
- 6. Playing games on the internet by oneself or with other players
- 8. A security system usually made up of hardware and software that blocks hackers, viruses and other malicious threats from a computer
- 9. Any illegal activity done on the internet
- 11. The introductory page of a website
- 12. Software or code that shows unwanted ads such as pop-ups on a device
- 14. Any unwelcome and unwanted e-mail or junk mail, including repeated comments on another's post
- 16. A type of cyberattack in which someone pretends to be a trustworthy person, website or organization to get victims to share their username, password or other personal information
- 18. A camera built into or attached to a computer that can send video online
- 20. The part of an internet address after the final period that identifies the type of organization using a website (e.g., .gov or .com)
- 22. Harmful actions such as repeatedly making fun of and intimidating others online through email, texting, social media and even gaming apps
- 24. Internet gamers who intentionally cause problems and/or cyberbully other gamers