Occurs when scammers register a web address that looks like it belongs to a real business
Cybersquatting
small files that your browser saves on your computer and may contain information such as your logins and passwords
Cookies
Involves the stealing of personal information such as passwords, social security numbers, credit card info, and corporate info
Data Theft
occurs when players of a game deliberately irritate and harass other players within the game through computer tricks
Griefing
the act of pretending to be another person online
Identity Spoofing
occurs when scammers steal a person’s online identity by gaining access to credit cards, banking information, and other information that can be used to prove a person’s existence.
Identity theft
programs that can hurt a computer by pretending to be something useful
Malware
occurs when people online promise more than they are going to deliver
Online fraud
emails that try to get information from people by pretending to be from a bank or other business
Phishing scams
a type of malware that collects information from computers and can keep record of everything you type
Spyware
a setting on browsers that allows you to save trusted websites that are commonly used
Bookmarks
a setting that can be found on communication websites that allows you to block other people from contacting you
Blocking
this is the first line of defense against malware and includes gaining access to the latest version of browser applications and antivirus software
Updates
this involves wiping out search history in order to get rid of cookies
Cache Clearing
this involves reporting bad behavior to sites that are hosting questionable content
ISP Clearing
the act of filtering out unwanted content through browser settings and special software
Content Filters
involves choosing a password that is a least seven characters long, is not related to the person using it, and is varied in capitalization and special characters
Creating strong passwords
A network security system that monitors incoming and outgoing traffic based on predetermined security rules
Firewall
are provided for websites that collect personal information and can give you instructions to have your information deleted
Privacy policies
A function that allows users to surf the web without saving anything to the users cache
Private Browsing Tool
Sites that use encryption methods to keep users data safe are called
Secure
Data that has been organized, structured, and presented to provide additional insight into its context, worth, and usefulness.
Information
Long-term increase in electrical power availability
Surge
an attack type that attempts to guess a password by using every possible combination of characters and numbers in it
Brute Force

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

technology

20 terms
Created on May 17, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016

Technology

26 terms
Created on Aug 12, 2016

Computer Science Vocabulary

11 terms
Created on Sep 9, 2016

Introduction to Web Design- Crossword 1

18 terms
Created on Sep 13, 2016

Computer Crossword Puzzle

19 terms
Created on Sep 22, 2016

E-Safety

20 terms
Created on Nov 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017

Cyberbullying

21 terms
Created on Jan 30, 2017

Digital Citizenship

19 terms
Created on Apr 4, 2017

Internet Safety Crossword

27 terms
Created on Apr 5, 2017

Internet Safety

15 terms
Created on Apr 26, 2017

IT&S Cyber Security Crossword Puzzle

16 terms
Created on Jun 2, 2017

Digital Literacy

38 terms
Created on Jun 15, 2017

Social Media Terms

51 terms
Created on Aug 17, 2017

Lesson 2: Internet Communication

21 terms
Created on Sep 8, 2017