Cybersecurity Ethics, Laws & Standards

1234567891011121314151617181920212223242526272829303132
Across
  1. 6. unauthorized access to computer systems
  2. 9. moral principles that govern a person's behavior or actions
  3. 10. policy that defines proper and improper use of technology and networks
  4. 13. process of converting data into a code to prevent unauthorized access
  5. 14. copies of data stored separately for recovery in case of loss
  6. 16. using someone else's work without giving proper credit
  7. 20. law that protects sensitive health information
  8. 21. coordinates international cybercrime investigations
  9. 26. security process requiring two separate forms of identification
  10. 29. online platforms for sharing content and communication
  11. 30. software designed to damage or disrupt a computer system
  12. 31. legal right that grants the creator control over their work
  13. 32. network security system that monitors and controls incoming and outgoing traffic
Down
  1. 1. criminal activity carried out using computers or the internet
  2. 2. trail of data created by a person’s online activity
  3. 3. software that secretly monitors user activity
  4. 4. option that controls who can see your online information
  5. 5. protects us critical infrastructure from cyber threats
  6. 7. deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
  7. 8. unauthorized access and release of confidential information
  8. 11. using digital technology to harass or intimidate someone
  9. 12. crime of obtaining someone’s personal information to commit fraud
  10. 15. manipulating people to give up confidential information
  11. 17. study of ethical issues surrounding computer use
  12. 18. protects student education records and data
  13. 19. a secret word or phrase used to gain access to a system
  14. 22. software designed to detect and remove malicious programs
  15. 23. malware that locks users out of their files until a payment is made
  16. 24. update to software that fixes vulnerabilities or bugs
  17. 25. proper and respectful behavior when communicating online
  18. 27. practices and steps taken to maintain system health and improve security
  19. 28. internet crime complaint center that accepts and investigates online crime reports