Cyber Ethics,Class 8

123456789101112131415
Across
  1. 3. When someone lies or tricks others to get money, property, or an unfair advantage.
  2. 4. A set of rules and proper behavior expected from individuals when interacting with other users online.
  3. 7. Tye act of using someone else's words, ideas, or work without giving proper credit.
  4. 9. Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
  5. 11. A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
  6. 13. When someone takes a website name that belongs to someone else.
  7. 15. Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
  1. 1. The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
  2. 2. Individual pieces of information.
  3. 5. A cyber attack that takes users to fake websites to steal personal information.
  4. 6. Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
  5. 8. When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
  6. 10. The right to keep your personal information, actions, or space protected from others' access or interference.
  7. 12. A type of malicious software that spreads itself through networks without needing to attach to other programs.
  8. 14. A global network that connects computers and allows people to share information and communicate.