Web Safety

12345678910111213141516171819202122232425
Across
  1. 2. Exception to copyright infringement.
  2. 4. A network controller which connects devices and allows effective communication between these devices.
  3. 5. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  4. 6. collection of computers controlled by users other than their own to perform automated tasks over the internet.
  5. 7. is being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet.
  6. 8. A device which monitors network activities for attacks and produces reports to a management station.
  7. 9. is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
  8. 11. Granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production.
  9. 12. Forwarding or distribution of a message which includes sexually explicit materials
  10. 15. Unauthorized reproduction or distribution of copyright materials.
  11. 16. Someone who is an expert at fixing and preparing computers, but they can also illegally gain access to other people's computers for their own profits.
  12. 17. Computer device which forwards data packets from one network to another.
  13. 19. Fraud which involves stealing personal information for financial gain through email.
  14. 20. Use of other peoples words, thoughts or ideas without crediting the source.
  15. 22. use of computers or other electronic device to purposely harm another person online.
  16. 23. “crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?”
  17. 24. Security component which encrypts data and keeps it private within a public network.
Down
  1. 1. Ownership of any creative work or invention.
  2. 3. Method through which hackers can gain access to a computer.
  3. 10. An internet user, who uses sites, chat rooms, or other cyberspace to hurt people for sexual or abusive purposes.
  4. 13. is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
  5. 14. Software designed to protect computers from viruses.
  6. 18. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  7. 19. messages distributed by electronic means from one computer user to one or more recipients via a network.
  8. 21. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  9. 25. a secret word or phrase that must be used to gain admission to something.