Across
- 3. Capable of copying itself and destroying data and/or a computer
- 8. A security system designed to prevent unauthorized access to or from a private network.
- 9. A tool that helps keep your online activity private by masking your IP address (abbreviation).
- 11. A picture taken of your screen, often used to show evidence of online bullying or inappropriate messages.
- 12. Pretending to be someone else online in order to deceive people.
- 13. The act of publicly revealing someone's personal information without their consent.
Down
- 1. Use of another person's private identifying information
- 2. Using technology to harass, threaten, or embarrass someone online.
- 4. A way to silence notifications from someone without unfriending or blocking them.
- 5. Fraudulent messages designed to steal sensitive information by pretending to be from a trusted source.
- 6. A dishonest attempt to get money or personal details through deception.
- 7. A software tool used to block access to inappropriate websites or content.
- 10. A combination of characters used to secure accounts; should never be shared.