cyber ethics
Across
- 4. Online harassment or abuse using digital platforms
- 5. Authentication method that adds a second layer of security
- 6. The trail of data a person leaves online
- 8. Fraudulent attempt to obtain sensitive information
- 9. Software that secretly gathers user information
- 12. Malicious software designed to harm systems or data
- 14. Software or hardware that blocks unauthorized access
- 16. Pretending to be someone else online
Down
- 1. Unauthorized access to computer systems
- 2. Method of converting data into unreadable code for security
- 3. Criminal activities carried out using computers or internet
- 5. A person who posts offensive or disruptive comments online
- 7. Protecting personal information online
- 9. A dishonest scheme meant to trick people online
- 10. Principles that guide responsible online behavior
- 11. A secret code used to access digital accounts
- 13. Legal right that protects creative online content
- 15. Software that protects against viruses and malware