E-Safety Year 7
Across
- 2. an image that you will see on a website to show that your site is secure
- 4. Everyone that uses the Internet will have one of these types of print
- 5. A ........ horse presents itself as a harmless program which contains hidden malicious code
- 7. Software that gathers information about a person without their consent
- 8. A software that replicates itself
- 12. Is a cyber attack intended to redirect a website's traffic to another, fake site.
- 13. This is another word for program
- 14. ........... engineering is an attack that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Down
- 1. A technique of fraudulently obtaining private information, often using email or SMS.
- 3. The use of technology to harass someone
- 6. Is an umbrella term that covers malicious software that will corrupt your computer
- 9. What you should do if you come across offensive, uncomfortable or inappropriate content
- 10. One of the 5 Ps
- 11. Examines ingoing and outgoing traffic