Type
Crossword
Description

This crossword contains the following questions and answers:

the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. Identity theft
How many people fall victim to identity theft a year Fifteen million
How much is lost in those 15 million Fifty billion
How many Americans are at risk every year 100 million
How do they get this info Stealing
What are the scams called Phishing and vishing
Whose identity was stolen in the movie Sandy Patterson
What are you a..... Kenyan
Identity protection Life lock
Put the --------- Down Scissors

    Customize    

Identity Theft Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of... Personal Information
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen. Identity
________ _________ and alerts can help to prevent mail theft. Electronic Statements
________ all unnecessary paperwork. DO NOT throw it in the garbage can. Shred
Do not leave wallets and purses in your _____. car
To protect yourself from online theft, use ________ internet sites. secure
If you become a victim of fraud, file a police report with your ______ jurisdiction. local
To protect members from Identity Theft, talk to them about _________ _______ of fraud. warning signs
Protect member's information by ___________ ID. verifying
Be cautious with use of your ____. SSN
A thief can use your identity by using your _______ card and/or ATM card to drain your funds. credit
A thief can use your identity to create ___________ ________ made with your account information on them. counterfeit checks
A thief may ______ benefits under your name. claim
To help protect yourself, ______ your credit report yearly. check
To prevent theft, do not write important ___________ down and keep it in an easily accessible. information
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards. card
______ ______ is when a person obtains and uses your personal information without your permission for financial gain. Identity theft
America First strives to keep its ________ safe by informing them of possible risks. members
If you obtain a stolen ID from a fraudulent member, do not give the ID ______. back
Always follow __________ procedures. security

    Customize    

Digital Citizenship Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

google
communication
software
hardware
vulnerable
plagiarism
firewall
identity
citation
digital footprint
scheme
scam
persistent
identity theft
social media
website
phishing
deceiving
malware
internet
flaming
anonymous
cyberbullying
bias
defaming
harassing
digital citizenship

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize    

online fraud protection Word Search

Type
Word Search
Description

This word search contains the following answers:

cyber
trustworthy
Attackers
unauthorized
security settings
downloading
anti-virus
spyware
Fraudulent Emails
Fraudsters
credentials
prevent
Social media
account access
identity theft
operating system
wireless network
password
Rogue
Phishing

    Customize    

Digital Citizenship Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

communication including television, radio, and newspapers, that often reaches and impacts a large audience media
electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself digital media
two or three dimensional icon that represents a compute user or a gamer avatar
the act of saying mean things online usually in ALL CAPS Flaming
remix or blend of multiple songs, videos, or other media content into one product Mash up
downloadable video or audio file. podcast
the illegal act of sending emails or messages that appear to come from authentic sources but really come from spammers. phishing
an attempt to trick someone, usually with the intention of stealing money or private information scam
a type of crime in which your private information is stolen and used for criminal activity identity theft
in a position that makes it easier for you to be harmed or attacked vulnerable
someone who sees cyberbullying but does nothing to help bystander
someone who helps when they see cyberbullying occur upstander
to imagine the feelings that someone else is experiencing empathize
bombarding someone with messages over digital media. repeated contact when it is least expected harassing
using fake names, posing as someone else, or creating a fake profile about someone else deceiving
a verbal attack targeting someone because of their race gender, religion or sexual orientation hate speech
a person who is the object of an intentional action target
a person who has malicious intents to hurt or damage someone offender
to increase or make intense escalate

    Customize    

Digital Citizenship crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

    Customize    

Fraud Watch Network Word Search

Type
Word Search
Description

This word search contains the following answers:

AARP
Safeguard
Hackers
Firewalls
Anti-virus
Crime
Cyber Security
Intimidation
Credibility
Scarcity
Profiling
Social Security
Credit Report
Con Artist
Watchdog
Phishing
Imposter
scams
identity theft
Fraud

    Customize    

Be Internet Awesome Vocabulary Word Search

Type
Word Search
Description

This word search contains the following answers:

Fraudulant
firewall
verifiable deceptive
authentic
Trustworthy
scam
spear phishing
phishing
boundary
settings
Personal information
digital footprint

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize