Across
- 4. Grooming is when someone builds your trust and makes a connection with you to get you to do something sexual or illegal.
- 6. irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
- 8. unsolicited mail that consists mainly of promotional materials, catalogs, and requests for donations
- 9. the fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one,
- 10. the fraudulent practice of sending emails or other messages purporting to be from reputable companies
- 12. Trolling is when someone post or comments online to deliberately upset others.
Down
- 1. In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program.
- 2. An active digital footprint is where the user has deliberately shared information about themselves
- 3. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 5. Catfishing is when someone sets up a fake online profile to trick people who are looking for love, usually to get money out of them
- 7. gain unauthorized access to data in a system or computer.
- 11. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
