Cyber Ethics

1234567891011121314
Across
  1. 5. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. 8. The practice of taking someone else's work or ideas and passing them off as one's own.
  3. 10. The act of installing a legal copy of software in contravention of its license agreement
  4. 13. The process of converting encrypted data back into its original, readable form
Down
  1. 1. Any criminal activity that involves a computer, network or networked device
  2. 2. ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
  3. 3. A type of malicious software (malware) that replicates itself and can cause damage to computer systems
  4. 4. A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
  5. 6. An illegal intrusion into a computer system
  6. 7. A type of cyberattack where attackers deceive individuals into revealing sensitive information
  7. 9. The etiquette or rules of polite and respectful online communication
  8. 11. A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
  9. 12. Unwanted bulk emails that come from unknown sources
  10. 14. The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access