CYBER ETHICS
Across
- 2. Unwanted and often harmful bulk emails. |
- 3. Online etiquette or good manners on the internet. |
- 9. Legal right granted to an inventor for a new invention. |
- 11. Installing one licensed software copy on multiple devices illegally. |
- 14. Theft Stealing someone's personal information for fraudulent use. |
- 15. Illegally breaking into systems to steal sensitive information. |
- 17. Illegal intrusion into a computer system or network. |
- 18. Footprint Online data left behind from a user's digital activity. |
Down
- 1. Using technology to harass or harm someone on purpose. |
- 2. Piracy Copying and distributing software illegally. |
- 4. Not morally correct or acceptable, especially in the digital world. |
- 5. Tricking users into clicking something they didn't intend to. |
- 6. Presenting someone else's work or ideas as your own. |
- 7. Legal protection for original creative work. |
- 8. Using phone calls or VoIP to steal personal information. |
- 9. Attempting to trick someone into revealing personal info via fake emails. |
- 10. A program that disrupts a computer's normal functioning. |
- 12. Criminal activity involving computers, networks, or the internet. |
- 13. Bombing Sending repeated spam to overflow someone’s inbox. |
- 16. Law Rules and restrictions imposed on online users. |