cyber ethics

12345678910111213141516
Across
  1. 4. Online harassment or abuse using digital platforms
  2. 5. Authentication method that adds a second layer of security
  3. 6. The trail of data a person leaves online
  4. 8. Fraudulent attempt to obtain sensitive information
  5. 9. Software that secretly gathers user information
  6. 12. Malicious software designed to harm systems or data
  7. 14. Software or hardware that blocks unauthorized access
  8. 16. Pretending to be someone else online
Down
  1. 1. Unauthorized access to computer systems
  2. 2. Method of converting data into unreadable code for security
  3. 3. Criminal activities carried out using computers or internet
  4. 5. A person who posts offensive or disruptive comments online
  5. 7. Protecting personal information online
  6. 9. A dishonest scheme meant to trick people online
  7. 10. Principles that guide responsible online behavior
  8. 11. A secret code used to access digital accounts
  9. 13. Legal right that protects creative online content
  10. 15. Software that protects against viruses and malware