Cybersecurity Ethics, Laws & Standards
Across
- 6. unauthorized access to computer systems
- 9. moral principles that govern a person's behavior or actions
- 10. policy that defines proper and improper use of technology and networks
- 13. process of converting data into a code to prevent unauthorized access
- 14. copies of data stored separately for recovery in case of loss
- 16. using someone else's work without giving proper credit
- 20. law that protects sensitive health information
- 21. coordinates international cybercrime investigations
- 26. security process requiring two separate forms of identification
- 29. online platforms for sharing content and communication
- 30. software designed to damage or disrupt a computer system
- 31. legal right that grants the creator control over their work
- 32. network security system that monitors and controls incoming and outgoing traffic
Down
- 1. criminal activity carried out using computers or the internet
- 2. trail of data created by a person’s online activity
- 3. software that secretly monitors user activity
- 4. option that controls who can see your online information
- 5. protects us critical infrastructure from cyber threats
- 7. deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
- 8. unauthorized access and release of confidential information
- 11. using digital technology to harass or intimidate someone
- 12. crime of obtaining someone’s personal information to commit fraud
- 15. manipulating people to give up confidential information
- 17. study of ethical issues surrounding computer use
- 18. protects student education records and data
- 19. a secret word or phrase used to gain access to a system
- 22. software designed to detect and remove malicious programs
- 23. malware that locks users out of their files until a payment is made
- 24. update to software that fixes vulnerabilities or bugs
- 25. proper and respectful behavior when communicating online
- 27. practices and steps taken to maintain system health and improve security
- 28. internet crime complaint center that accepts and investigates online crime reports