Internet Safety KIM Chart

12345678910111213141516171819
Across
  1. 6. the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
  2. 10. predators are people who use the internet to exploit usually younger people for sexual and other purposes.
  3. 11. Cybersecurity involves the practices and technologies designed to protect computers, networks, and data from unauthorized access, attacks, or damage. It encompasses measures taken to defend against cyber threats and ensure the integrity, confidentiality, and availability of information.
  4. 13. Ransomware is a type of malicious software (malware) that encrypts a victim's files or locks them out of their computer, demanding a ransom payment to restore access. It is a significant cyber threat that can cause serious disruption and financial loss to individuals and organizations.
  5. 15. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  6. 16. A digital footprint, sometimes called a “digital shadow,” is the unique trail of data that a person or business creates while using the internet. Nearly every online activity leaves a trace. Some traces are obvious, like a public social media post.
  7. 17. Piracy refers to the unauthorized use, reproduction, or distribution of copyrighted materials, such as software, music, films, and books, without permission from the rights holder. It is considered a form of intellectual property theft and is illegal in many jurisdictions.
  8. 18. A blog (short for "weblog") is a type of website or online journal where individuals or groups regularly post content, such as articles, opinions, or updates. Blogging allows for sharing information and engaging with an audience, but it also carries responsibilities regarding accurate information and online etiquette.
  9. 19. In online communication, shouting typically refers to using all capital letters in text, which can be perceived as yelling or being aggressive. It is often discouraged in digital communication as it can lead to misunderstandings and escalate conflicts.
Down
  1. 1. Trolling refers to the act of intentionally provoking or upsetting others online by posting inflammatory, irrelevant, or off-topic messages. Flaming is a form of trolling that involves posting aggressive or insulting comments aimed at inciting emotional responses. Both behaviors can disrupt online communities and contribute to a hostile environment.
  2. 2. A cookie is a small piece of data stored on a user's computer by their web browser while browsing a website. Cookies are used to remember information about users, such as login details or preferences, but can also raise privacy concerns regarding tracking user behavior online.
  3. 3. alter (a photographic image) digitally using Photoshop image-editing software.
  4. 4. Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes be a component of impersonation and is treated as the same crime in some places.
  5. 5. Grooming is the process by which an adult builds an emotional connection with a child or vulnerable individual online to manipulate, exploit, or abuse them. This behavior often involves the use of deceitful tactics to gain trust before engaging in inappropriate or harmful actions.
  6. 6. Cybercrime refers to illegal activities conducted via the internet or through computer networks. This includes a wide range of offenses, such as hacking, identity theft, online fraud, and the distribution of malware.
  7. 7. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
  8. 8. Happy-slapping refers to a form of bullying or harassment where an individual records an assault or an act of violence against another person, often without their knowledge, and then shares the video online or with others. This behavior typically involves the assailant slapping or physically attacking the victim, and it is intended to be entertaining or humorous to the perpetrators and viewers.
  9. 9. Privacy settings are controls available on many websites and apps to limit who can access your profile and what information visitors can see.
  10. 12. Be careful who you trust online and remember that some online 'friends' are really strangers. Keep your personal information secret when completing your profile or chatting online (name, address, telephone number, mobile number, private email address, picture), even if people ask for this.
  11. 14. Netiquette includes values such as tolerance, respect and helpfulness. This also means that only the language used by everyone should be used.