Internet Safety Revision
Across
- 3. When internet services are used to carry out attacks
- 5. A malicious program that hides in another program
- 7. Use this to check the ownership of domain names
- 8. Being blackmailed into sending explicit photos or videos
- 11. Name for the program a virus will execute
- 12. D---- By Downloads are automatically sent to your computer when you visit certain websites or view HTML mail messages
- 13. You should never ------ files without the consent of the author
- 14. I------- Document is a portfolio built up to steal financial assets
- 15. T---- Bomb A virus that activates at a certain time or date
- 18. If you store (or post) personal information about other people you need to be aware of the D--- P--------- A--
- 19. M---- Virus is a Virus contained within common files such as a word document
- 20. You should report online safety issues to….
Down
- 1. K-- logger records every keystroke you make
- 2. Collective term for defensive measures to counter copyright infringement (DRM)
- 4. A virus that creates backdoors into systems
- 6. Keeps you “hidden” on the internet
- 9. C-------- is about the ownership of work
- 10. A R------ Virus stays hidden in a computer’s memory
- 16. Used to hide the meaning of important messages
- 17. Providing inaccurate information pretending to be a younger person