Identity Theft and Internet Safety

12345678910111213141516171819
Across
  1. 2. E-mail that is not wanted
  2. 6. Wrongful or criminal deception intended to result in financial or personal gain
  3. 9. The use of electronic communication to torment a person, typically by sending messages of an intimidating or threatening nature
  4. 10. Luring (someone) into a relationship by means of a fictional online identity
  5. 12. Any skilled computer expert that uses their technical knowledge to overcome a problem
  6. 13. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. 15. Software secretly installed on a computer used to monitor your online activity
  8. 16. Software that is intended to do bad things like damage or disable computers and computer systems
  9. 17. A type of malicious software that blocks access to the victim's data and threatens to publish or delete it until a ransom is paid
  10. 18. Sending fraudulent emails pretending to be from real companies in order to get people to reveal information, such as passwords and credit card numbers
Down
  1. 1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. 3. software that automatically shows or downloads advertising material (often unwanted) when a user is online
  3. 4. Kind of theft when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes
  4. 5. An image of the data displayed on the monitor of a computer or mobile device
  5. 7. To receive data from a remote system
  6. 8. A secret word or phrase that must be used to gain admission to something
  7. 9. Criminal activities carried out by means of computers or the Internet
  8. 11. Fixed, cannot be broken into
  9. 14. Software designed to detect and destroy computer viruses
  10. 19. A connection file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen