CSCU Module 05 - Security on Social Networking Sites

1234567891011121314151617181920
Across
  1. 2. Controls that allow users to limit who can see their information or posts on social media.
  2. 4. A social engineering attack that tricks users into revealing sensitive information through fake messages or websites.
  3. 12. People who can see your public posts or updates on Twitter.
  4. 13. A short message shared publicly on Twitter.
  5. 14. A crime in which someone steals another person’s personal information to commit fraud or illegal acts.
  6. 15. A trick where attackers hide malicious links under legitimate buttons or videos to make users click them unknowingly.
  7. 16. A Facebook feature that lets you pick friends who can help you recover your account.
  8. 18. A private message sent between users on Twitter.
  9. 19. The section on Facebook showing your posts and activities over time.
Down
  1. 1. A hacking technique that uses fake website links that look similar to real ones.
  2. 3. Online platforms that allow people to connect, share information, and communicate digitally.
  3. 5. Notifications sent when an account is accessed from an unknown device or location.
  4. 6. Advertisements shown on social media based on your online interests.
  5. 7. A security feature that requires both a password and a verification code for login.
  6. 8. A browser or account setting that prevents websites from collecting your online activity data.
  7. 9. Manipulating people into revealing confidential information without using technical hacking.
  8. 10. A feature that prevents certain users from seeing your profile or contacting you.
  9. 11. A personal page on a social networking site containing user information such as name, photos, and interests.
  10. 17. Embedding location data such as latitude and longitude into photos or posts shared online.
  11. 20. Malicious software designed to harm or steal data from a computer or device.