Cyber Ethics
Across
- 5. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- 8. The practice of taking someone else's work or ideas and passing them off as one's own.
- 10. The act of installing a legal copy of software in contravention of its license agreement
- 13. The process of converting encrypted data back into its original, readable form
Down
- 1. Any criminal activity that involves a computer, network or networked device
- 2. ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
- 3. A type of malicious software (malware) that replicates itself and can cause damage to computer systems
- 4. A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
- 6. An illegal intrusion into a computer system
- 7. A type of cyberattack where attackers deceive individuals into revealing sensitive information
- 9. The etiquette or rules of polite and respectful online communication
- 11. A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
- 12. Unwanted bulk emails that come from unknown sources
- 14. The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access