Cybersecurity Lesson 1 & 2 Key Terms

1234567891011121314151617
Across
  1. 4. is exchange of suggestive messages or images via mobile phone texting.
  2. 6. many social networking web sites require you to set up.
  3. 8. are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
  4. 10. is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
  5. 11. someone who intentionally targets people for harm using online chat rooms or social media.
  6. 12. is a detailed report, usually about a person.
  7. 15. people online that often try to obtain information about you.
  8. 16. is bullying that takes place using electronic technology.
  9. 17. on the internet is a technical measure intended to restrict access to information.
Down
  1. 1. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
  2. 2. is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
  3. 3. can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
  4. 5. keeping your personal information safe and personal.
  5. 7. is the action of subjecting someone to aggressive pressure or intimidation.
  6. 9. is the ability to act in a safe and responsible way on the internet and other connected environments.
  7. 13. where you connect with other players and can chat with them either by voice or by text.
  8. 14. a person who witness someone getting bullied but does nothing to stop it.