E-Ethics
Across
- 3. cyber crime
- 4. the illegal obtaining, giving or selling of passwords
- 6. Used to protect designed (say an invention or a door knob) IP
- 7. - someone who illegally alters computer hardware or breaches computer
- 10. take advantage of kids by using instant messaging, e-mail and social network sites
- 12. federal regulatory body which monitors and deals with identity theft
- 14. involves fraudulent e-mails pretending to originate from banks or online O
- 16. any crime involving computers
- 20. This is used to protect our IP symbols
- 21. when someone steals personal information to commit fraud or other crimes
- 22. security measure used on today’s Internet which insures the data is secure
- 23. can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening Harassment
- 25. stealing money or property using interstate wire communication; considered a federal crime
- 26. software installed discreetly which alters the usability of a computer
Down
- 1. a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- 2. modifying electronics such as an Xbox®, cell phone, or iPod®
- 5. nature
- 8. Internet harassment
- 9. Way to protect a written IP
- 11. a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints
- 13. to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- 15. an individual who alters electronics legally
- 17. the illegal stealing, copying or spreading of media including software, movies and music
- 18. such as eBay® or PayPal®
- 19. a form of cybercrime where offensive letters are sent through e-mail
- 24. software programs which spread from computer to computer and are malicious