Occurs when scammers register a web address that looks like it belongs to a real business
small files that your browser saves on your computer and may contain information such as your logins and passwords
Involves the stealing of personal information such as passwords, social security numbers, credit card info, and corporate info
Data Theft
occurs when players of a game deliberately irritate and harass other players within the game through computer tricks
the act of pretending to be another person online
Identity Spoofing
occurs when scammers steal a person’s online identity by gaining access to credit cards, banking information, and other information that can be used to prove a person’s existence.
Identity theft
programs that can hurt a computer by pretending to be something useful
occurs when people online promise more than they are going to deliver
Online fraud
emails that try to get information from people by pretending to be from a bank or other business
Phishing scams
a type of malware that collects information from computers and can keep record of everything you type
a setting on browsers that allows you to save trusted websites that are commonly used
a setting that can be found on communication websites that allows you to block other people from contacting you
this is the first line of defense against malware and includes gaining access to the latest version of browser applications and antivirus software
this involves wiping out search history in order to get rid of cookies
Cache Clearing
this involves reporting bad behavior to sites that are hosting questionable content
ISP Clearing
the act of filtering out unwanted content through browser settings and special software
Content Filters
involves choosing a password that is a least seven characters long, is not related to the person using it, and is varied in capitalization and special characters
Creating strong passwords
A network security system that monitors incoming and outgoing traffic based on predetermined security rules
are provided for websites that collect personal information and can give you instructions to have your information deleted
Privacy policies
A function that allows users to surf the web without saving anything to the users cache
Private Browsing Tool
Sites that use encryption methods to keep users data safe are called
Data that has been organized, structured, and presented to provide additional insight into its context, worth, and usefulness.
Long-term increase in electrical power availability
an attack type that attempts to guess a password by using every possible combination of characters and numbers in it
Brute Force

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Cyber Security

20 terms
Created on Apr 25, 2016


20 terms
Created on May 17, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016


26 terms
Created on Aug 12, 2016

Computer Science Vocabulary

11 terms
Created on Sep 9, 2016

Introduction to Web Design- Crossword 1

18 terms
Created on Sep 13, 2016

Computer Crossword Puzzle

19 terms
Created on Sep 22, 2016


20 terms
Created on Nov 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017


21 terms
Created on Jan 30, 2017

Digital Citizenship

19 terms
Created on Apr 4, 2017

Internet Safety Crossword

27 terms
Created on Apr 5, 2017

Internet Safety

15 terms
Created on Apr 26, 2017

IT&S Cyber Security Crossword Puzzle

16 terms
Created on Jun 2, 2017

Digital Literacy

38 terms
Created on Jun 15, 2017

Social Media Terms

51 terms
Created on Aug 17, 2017

Lesson 2: Internet Communication

21 terms
Created on Sep 8, 2017