Cyber Ethics
Across
- 2. Prevents unauthorized access to or from a private network
- 4. A safe, protected digital environment
- 6. The trail of data you leave online
- 7. Secure tunnel for online privacy
- 9. Keeping personal data safe from misuse
- 12. The act of intentionally hurting others online
- 14. Rules of right and wrong in the digital world
- 17. A good hacker who helps protect systems by finding and security flaws
- 18. Pretending to be someone else online
- 20. Telling a trusted adult about unethical behavior
Down
- 1. A small file that tracks your website activity
- 3. Software that protects against malicious programs
- 5. Your online identity or login name
- 8. Taking someone else's work without credit
- 10. The process of verifying identity
- 11. Software that secretly gathers user info
- 13. Harmful software that damages systems
- 15. Asking for someone's okay before posting their photo
- 16. A secret combination of characters that protects your account
- 19. A fake email that tricks you into giving personal info