Cybersecurity Terms and Definitions

12345678910111213141516171819202122232425
Across
  1. 5. Connection between a computer and a modem on radio frequencies that allows accessing the internet without being connected to wires
  2. 7. A website or program that allows users to talk with lots of people at once, like texting on the internet instead of the phone
  3. 10. Code or software that can replicate itself, is usually sent through email attachments and can damage computers and hard drives
  4. 13. Using the internet to send a copy of a file from one website, system, program, computer or device to another
  5. 15. A program that runs on a computer
  6. 17. Physical computer equipment and related machines and parts
  7. 19. Software put on a computer to spy and collect and send information to cybercriminals
  8. 21. An online record of all the websites a user visits and the emails a user sends, which can stay even after deleting their browser history and emails
  9. 23. Letters and messages sent from one computer or device to another computer or device
  10. 25. Malicious software or code used to steal information and damage devices
Down
  1. 1. Software that tries to stop viruses or malware from attacking a computer or other device
  2. 2. A small packet of software that lets a website or browser track users by storing some of their information, such as what clothing online shoppers like
  3. 3. Anything done to protect computers, devices and software from cybercrimes
  4. 4. Websites that allow users to post comments and have conversations with other users, for example, in online classes
  5. 6. Playing games on the internet by oneself or with other players
  6. 8. A security system usually made up of hardware and software that blocks hackers, viruses and other malicious threats from a computer
  7. 9. Any illegal activity done on the internet
  8. 11. The introductory page of a website
  9. 12. Software or code that shows unwanted ads such as pop-ups on a device
  10. 14. Any unwelcome and unwanted e-mail or junk mail, including repeated comments on another's post
  11. 16. A type of cyberattack in which someone pretends to be a trustworthy person, website or organization to get victims to share their username, password or other personal information
  12. 18. A camera built into or attached to a computer that can send video online
  13. 20. The part of an internet address after the final period that identifies the type of organization using a website (e.g., .gov or .com)
  14. 22. Harmful actions such as repeatedly making fun of and intimidating others online through email, texting, social media and even gaming apps
  15. 24. Internet gamers who intentionally cause problems and/or cyberbully other gamers