E-Ethics

1234567891011121314151617181920212223242526
Across
  1. 3. cyber crime
  2. 4. the illegal obtaining, giving or selling of passwords
  3. 6. Used to protect designed (say an invention or a door knob) IP
  4. 7. - someone who illegally alters computer hardware or breaches computer
  5. 10. take advantage of kids by using instant messaging, e-mail and social network sites
  6. 12. federal regulatory body which monitors and deals with identity theft
  7. 14. involves fraudulent e-mails pretending to originate from banks or online O
  8. 16. any crime involving computers
  9. 20. This is used to protect our IP symbols
  10. 21. when someone steals personal information to commit fraud or other crimes
  11. 22. security measure used on today’s Internet which insures the data is secure
  12. 23. can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening Harassment
  13. 25. stealing money or property using interstate wire communication; considered a federal crime
  14. 26. software installed discreetly which alters the usability of a computer
Down
  1. 1. a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
  2. 2. modifying electronics such as an Xbox®, cell phone, or iPod®
  3. 5. nature
  4. 8. Internet harassment
  5. 9. Way to protect a written IP
  6. 11. a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints
  7. 13. to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  8. 15. an individual who alters electronics legally
  9. 17. the illegal stealing, copying or spreading of media including software, movies and music
  10. 18. such as eBay® or PayPal®
  11. 19. a form of cybercrime where offensive letters are sent through e-mail
  12. 24. software programs which spread from computer to computer and are malicious