Cyber Laws & Ethics
Across
- 2. protect brands, logos, and symbols that distinguish goods or services
- 4. private browsing mode
- 7. the act of using someone else’s work or ideas without proper acknowledgment
- 8. Sending bulk emails
- 10. someone gains unauthorized access to a computer system or network
- 12. refers to safe and responsible use of ICT
- 13. protect new inventions or discoveries
- 14. scammers send fake emails or messages pretending to be someone trustworthy
Down
- 1. Internet etiquette
- 3. involves secretly listening to or intercepting private communications
- 5. remember our visits on website
- 6. a type of malicious software that locks or encrypts a victim’s data, demanding payment
- 9. data that is left behind when users have been online
- 11. illegal activities conducted through computers or the internet
- 12. people who deliberately post inflammatory or offensive comments online to provoke others