Type
Word Search
Description

This word search contains the following answers:

cybercriminal
email
fraud
idenity theft
internet
online shopping
pharming
phishing
safety
Social Security

    Customize    

online fraud protection Word Search

Type
Word Search
Description

This word search contains the following answers:

cyber
trustworthy
Attackers
unauthorized
security settings
downloading
anti-virus
spyware
Fraudulent Emails
Fraudsters
credentials
prevent
Social media
account access
identity theft
operating system
wireless network
password
Rogue
Phishing

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize    

internet safety words Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

a canned meat product or material you do not went sent to you spam
what parents do to keep you safe on the internet monitoring
programs that make your computer not work viruses
people who cause problems for online gamers griefers
a program that helps keep your computer safe anti-virus program
programs that track you illegally on the internet or track what you are doing spyware
when someone picks on or harasses you on the internet cyber-bullying
when someone steals personal information and uses it for themselves identity theft
attempting to gather credit card infor, or personal information by false emails phishing
when someone follows you from site to site or through your cell phone and email cyber-stalking

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

    Customize    

Identity Theft Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of... Personal Information
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen. Identity
________ _________ and alerts can help to prevent mail theft. Electronic Statements
________ all unnecessary paperwork. DO NOT throw it in the garbage can. Shred
Do not leave wallets and purses in your _____. car
To protect yourself from online theft, use ________ internet sites. secure
If you become a victim of fraud, file a police report with your ______ jurisdiction. local
To protect members from Identity Theft, talk to them about _________ _______ of fraud. warning signs
Protect member's information by ___________ ID. verifying
Be cautious with use of your ____. SSN
A thief can use your identity by using your _______ card and/or ATM card to drain your funds. credit
A thief can use your identity to create ___________ ________ made with your account information on them. counterfeit checks
A thief may ______ benefits under your name. claim
To help protect yourself, ______ your credit report yearly. check
To prevent theft, do not write important ___________ down and keep it in an easily accessible. information
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards. card
______ ______ is when a person obtains and uses your personal information without your permission for financial gain. Identity theft
America First strives to keep its ________ safe by informing them of possible risks. members
If you obtain a stolen ID from a fraudulent member, do not give the ID ______. back
Always follow __________ procedures. security

    Customize