Cyber

1234567891011121314151617181920212223242526272829
Across
  1. 2. Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
  2. 4. A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
  3. 6. Any unsolicited e-mail, or junk mail
  4. 8. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
  5. 11. A hostile, strongly worded message that may contain obscene language
  6. 13. Any Internet-related illegal activity
  7. 15. Methods individuals use to track, lure, or harass another person online
  8. 16. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
  9. 18. A diary or personal journal kept on a website
  10. 21. To send information from your computer to another computer
  11. 22. Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
  12. 25. stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
  13. 27. A tracking feature of Internet browsers that shows all the recent websites visited
  14. 28. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
  15. 29. The name a user selects to be identified on a computer, on a network, or in an online gaming forum
Down
  1. 1. To upload information to the Web
  2. 2. A program, or set of instructions, that runs on a computer
  3. 3. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
  4. 5. To copy a file from one computer system to another via the Internet
  5. 7. A location online that allows multiple users to communicate electronically with each other in real time
  6. 9. A form of malicious code that displays unsolicited advertising on your computer
  7. 10. “Live” time; the actual time during which something takes place
  8. 12. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
  9. 14. Willful and repeated harm inflicted through the medium of electronic text
  10. 17. Refers to virtual sexual encounters between two or more persons
  11. 19. Rules or manners for interacting courteously with others online
  12. 20. A piece of information about your visit to a website that some websites record automatically on your computer
  13. 23. Software that attempts to block malicious programs from harming your computer
  14. 24. A secret word or number that must be used to gain access to an online service
  15. 26. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory