Web Ethics & Security

1234567891011121314151617181920
Across
  1. 11. The rights given to a person that created something of their own on their own.
  2. 15. An individual who uses the internet to locate people, typically children to commit child sexual abuse.
  3. 16. A type of program that uses a certain code which then is used to change the way that a computer operates.
  4. 19. Stealing software that is legally protected. For example, copyright, modifying, and distributing.
  5. 20. a scheme used to damage another individual by using email.
Down
  1. 1. Using someone else's identity to gain benefits in their name.
  2. 2. A type of program that copies itself that way it is able to spread onto other computers.
  3. 3. The use of technology to bully someone over the internet. It is usually a mean message, or a threat.
  4. 4. Creation, distribution, or forwarding of a message which contains sexually explicit materials through an electronic device.
  5. 5. Number of internet connected devices, each of these are running one or possibly more bots.
  6. 6. The act of a computer virus attaching itself to a virus
  7. 7. The malicious activity a computer virus or worm is designed to do
  8. 8. When A certain amount used permitted by Copyright.
  9. 9. A device that provides security/safeguard from unauthorized people.
  10. 10. this is a type of software that is usually used to damage other computers.
  11. 12. A type of malware that misleads the person using the computer of its real intent.
  12. 13. Taking someone else’s ideas, or work and saying that is it yours especially without permission.
  13. 14. a large, frequently run program attached to the virus.
  14. 17. The right given to somebody else from the creator in order to publish their work.
  15. 18. Someone who uses computers to gain access to unauthorized data.