Internet saftey
Across
- 3. the information about a particular person that exists on the internet as a result of their online activity.
- 8. to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- 9. Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
- 10. the correct or acceptable way of communicating on the internet.
- 12. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- 13. controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- 16. talk in a friendly and informal way.
- 17. the practice of protecting systems, networks, and programs from digital attacks.
- 18. the practice of preparing or training someone for a particular purpose or activity.
Down
- 1. shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
- 2. the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- 4. using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- 5. A blog is a space where an individual, group, or organization can publish articles (also known as posts) on a regular basis. Blogs tend to include timely, relevant and updated content.
- 6. attention-seeking behavior
- 7. remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.
- 11. unauthorized reproduction or distribution of someone's intellectual property without their consent.
- 14. Ransomware is a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid. Since 2018, there has been a 264% increase in large breaches reported to OCR involving ransomware attack
- 15. a person who ruthlessly exploits others.
- 17. someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.