E-Safety Year 7

1234567891011121314
Across
  1. 2. an image that you will see on a website to show that your site is secure
  2. 4. Everyone that uses the Internet will have one of these types of print
  3. 5. A ........ horse presents itself as a harmless program which contains hidden malicious code
  4. 7. Software that gathers information about a person without their consent
  5. 8. A software that replicates itself
  6. 12. Is a cyber attack intended to redirect a website's traffic to another, fake site.
  7. 13. This is another word for program
  8. 14. ........... engineering is an attack that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Down
  1. 1. A technique of fraudulently obtaining private information, often using email or SMS.
  2. 3. The use of technology to harass someone
  3. 6. Is an umbrella term that covers malicious software that will corrupt your computer
  4. 9. What you should do if you come across offensive, uncomfortable or inappropriate content
  5. 10. One of the 5 Ps
  6. 11. Examines ingoing and outgoing traffic