Learning Aim C: Online safety, security, and legal/ethical issues

1234567891011121314151617181920
Across
  1. 2. (7) – Malware that secretly monitors activity and collects data.
  2. 5. (10) – Copying work and claiming it as your own.
  3. 8. (13) – False or misleading information shared online.
  4. 10. (10,3,6) – Rules for using IT/internet in school/work.
  5. 12. (4) – Malware that spreads automatically across networks.
  6. 14. (8) – Fake messages that trick users into sharing details.
  7. 17. (8,4) – Information that identifies a person.
  8. 18. (10) – Scrambling data so only authorised users can read it.
  9. 19. (10) – Malware that locks files and demands payment.
  10. 20. (13) – Bullying or harassment using online platforms.
Down
  1. 1. (9) – Legal protection for creative work.
  2. 3. (14) – Proving identity before access is given.
  3. 4. (7,9) – The trail of data you leave online.
  4. 5. (6) – Illegal copying/downloading of copyrighted content.
  5. 6. (5) – Malware that attaches to files and spreads when run.
  6. 7. (6,11) – Manipulating people to give up information or access.
  7. 9. (6) – Malware disguised as legitimate software.
  8. 11. (7,8) – Controls what others/apps can see about you.
  9. 13. (7) – Harmful software designed to damage devices or steal information.
  10. 15. (8) – Security that filters traffic to block threats.
  11. 16. (9) – Software that detects and removes malware.