Internet saftey

123456789101112131415161718
Across
  1. 3. the information about a particular person that exists on the internet as a result of their online activity.
  2. 8. to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
  3. 9. Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
  4. 10. the correct or acceptable way of communicating on the internet.
  5. 12. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  6. 13. controls available on many websites and apps to limit who can access your profile and what information visitors can see.
  7. 16. talk in a friendly and informal way.
  8. 17. the practice of protecting systems, networks, and programs from digital attacks.
  9. 18. the practice of preparing or training someone for a particular purpose or activity.
Down
  1. 1. shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
  2. 2. the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
  3. 4. using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
  4. 5. A blog is a space where an individual, group, or organization can publish articles (also known as posts) on a regular basis. Blogs tend to include timely, relevant and updated content.
  5. 6. attention-seeking behavior
  6. 7. remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.
  7. 11. unauthorized reproduction or distribution of someone's intellectual property without their consent.
  8. 14. Ransomware is a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid. Since 2018, there has been a 264% increase in large breaches reported to OCR involving ransomware attack
  9. 15. a person who ruthlessly exploits others.
  10. 17. someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.