Cyber Ethics
Across
- 3. Faking the source of data or communication.
- 7. Converting data into a form that is unreadable to unauthorized user
- 8. The illegal copying or distribution of copyrighted software
- 11. Software designed to damage or disable computers and computer systems.
- 12. Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, used in commerce.
- 13. The use of electronic communication to bully or harass someone.
- 14. Unsolicited and unwanted emails or messages
- 16. The act of stealing someone's personal information and using it to impersonate them.
Down
- 1. An acronym that stands for "Terms of Service
- 2. Measures taken to protect computer systems and data from unauthorized access or damage.
- 4. The right of individuals to control the collection and use of their personal information.
- 5. The legal right that grants the creator of an original work exclusive control over its use and distribution.
- 6. Unauthorized access to a computer or network
- 9. The doctrine that allows limited use of copyrighted material without permission for purposes such as criticism, commentary, or education.
- 10. An attempt to trick someone into revealing personal information, such as passwords or credit card details
- 15. personal data and information are kept secure and protected from unauthorized access or misuse.