Across
- 5. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- 6. A group of computers, printers and devices that are interconnected and governed as a whole.
- 7. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 9. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 11. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 13. People who use the internet to exploit usually younger people for sexual and other purposes.
- 15. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 18. A technique used by hackers to obtain sensitive information.
- 19. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
- 1. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- 2. An audio or video clip that has been edited and manipulated to seem real or believable.
- 3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 4. FOOTPRINT, The information about a particular person that exists on the internet as a result of their online activity.
- 7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 8. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use.
- 10. THEFT, Occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefit.
- 12. ADRESS, An internet version of a home address for your computer, which is identified when it communicates over a network.
- 14. CITIZEN, A person who develops the skills and knowledge to effectively use the internet and other digital technology, especially in order to participate responsibly in social and civic activities:
- 16. A type of malware that functions by spying on user activity without their knowledge.
- 17. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.