Cyber Ethics
Across
- 3. A fake email that tricks you into giving personal info
- 5. Breaking a system's security to test or exploit it
- 8. Pretending to be someone else online
- 10. A small file that tracks your website activity
- 11. Taking someone else's work without credit
- 12. type of malware that is designed to spy on user activity.
- 14. The unauthorize use of copyrighted content
- 16. The trail of data you leave online
Down
- 1. The method of verifying your identity.
- 2. Prevents unauthorized access to or from a private network
- 4. Stealing and using someone else's online identity
- 6. Legal protection for original digital content
- 7. Makes judgement on cyber crimes.
- 9. A secret combination of characters that protects your account
- 13. Software that protects against malicious programs
- 15. Unwanted, irrelevant messages sent over internet, usually advertising or phishing.