Across
- 3. Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
- 5. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
- 9. A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
- 12. The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
- 13. designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
- 14. An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
- 1. The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
- 2. The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
- 4. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- 6. The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
- 7. The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
- 8. The right to keep personal information and online activities confidential and secure from unauthorized access.
- 10. Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
- 11. Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.