esafety

1234567891011121314
Across
  1. 3. Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
  2. 5. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
  3. 9. A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
  4. 12. The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
  5. 13. designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
  6. 14. An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
  1. 1. The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
  2. 2. The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
  3. 4. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
  4. 6. The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
  5. 7. The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
  6. 8. The right to keep personal information and online activities confidential and secure from unauthorized access.
  7. 10. Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
  8. 11. Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.