INTERNET SAFETY CROSSWORD

12345678910111213141516171819
Across
  1. 5. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  2. 6. A group of computers, printers and devices that are interconnected and governed as a whole.
  3. 7. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  4. 9. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  5. 11. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  6. 13. People who use the internet to exploit usually younger people for sexual and other purposes.
  7. 15. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  8. 18. A technique used by hackers to obtain sensitive information.
  9. 19. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
  1. 1. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  2. 2. An audio or video clip that has been edited and manipulated to seem real or believable.
  3. 3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. 4. FOOTPRINT, The information about a particular person that exists on the internet as a result of their online activity.
  5. 7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  6. 8. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use.
  7. 10. THEFT, Occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefit.
  8. 12. ADRESS, An internet version of a home address for your computer, which is identified when it communicates over a network.
  9. 14. CITIZEN, A person who develops the skills and knowledge to effectively use the internet and other digital technology, especially in order to participate responsibly in social and civic activities:
  10. 16. A type of malware that functions by spying on user activity without their knowledge.
  11. 17. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.