Internet Safety Puzzle
Across
- 2. controls available on many websites and apps to limit who can access your profile and what information visitors can see
- 5. tiny files of data used to track your online activities and information when you're browsing a website
- 7. the correct or acceptable way of communicating on the internet
- 9. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- 11. the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
- 12. which is the act of someone causing discord online or in person.
- 14. the information about a particular person that exists on the internet as a result of their online activity.
- 15. the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- 16. a type of malware (malicious software) designed to deny access to a user's data
Down
- 1. Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
- 3. Using all caps when you type
- 4. An online conversation
- 6. the practice of protecting systems, networks, and programs from digital attacks
- 8. Being nice or showing kindness to a child to eventually have them comfortable enough to do something bad
- 10. using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- 11. posting, sharing, or saying harmful things about someone on the internet
- 13. the animal that looks for prey to eat