Internet Terms

123456789101112131415161718192021
Across
  1. 1. The process of documenting and communicating security incidents to the appropriate personnel or authorities.
  2. 3. Programs installed without your explicit consent. Spyware can remotely control your computer or collect your personal information and send it to a third party.
  3. 5. Someone who sends mass amounts of unsolicited commercial emails.
  4. 6. A hyperlink that leads to harmful websites, often used in phishing attacks.
  5. 11. A strong password that is difficult to guess, typically containing a mix of letters, numbers, and special characters.
  6. 13. A file sent along with an email message.
  7. 15. The process of confirming a person's identity, often used in financial transactions and account setups.
  8. 17. Procedures used to regain access to an online account after being locked out, often involving security questions or email verification.
  9. 18. Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections.
  10. 21. The practices and settings that control the visibility of personal information shared on social media platforms.
Down
  1. 1. The unauthorized use of someone’s personal information, typically for financial gain.
  2. 2. The process of converting data into a coded format to prevent unauthorized access.
  3. 3. Manipulative tactics used by attackers to trick individuals into divulging confidential information.
  4. 4. Software that spreads from computer to computer and damages files or disrupts your system.
  5. 7. A situation where a hacker gains unauthorized access to a user's account, often through stolen credentials.
  6. 8. The trail of data that individuals leave online through their activities, including social media, browsing, and online purchases.
  7. 9. Spam or a pop-up message to lure personal and financial information from unsuspecting victims.
  8. 10. Computer code that is placed on a hard drive when Internet users go to websites and allow the sites to identify the computer if it returns to the site.
  9. 12. A statement that explains how an organization collects, uses, and protects user data.
  10. 14. A method of data transmission where only the communicating users can read the messages, preventing access by intermediaries.
  11. 16. A wireless network that is protected with strong encryption protocols, like WPA3, to prevent unauthorized access.
  12. 19. Unsolicited commercial email. There are two types of spam, legal and illegal. The subject line is considered legally deceptive if it has a tendency or capacity to deceive consumers.
  13. 20. A person who uses the Internet to access computers and information without permission.