Cyber Ethics
Across
- 2. Authentication method that adds a second layer of security
- 7. A person who posts offensive or disruptive comments online
- 11. Software that protects against viruses and malware
- 13. The trail of data a person leaves online
- 14. Pretending to be someone else online
- 17. A dishonest scheme meant to trick people online
- 18. Proper and respectful behavior on the internet
- 19. Software or hardware that blocks unauthorized access
- 20. Online harassment or abuse using digital platforms
Down
- 1. Method of converting data into unreadable code for security
- 3. Legal right that protects creative online content
- 4. Software that secretly gathers user information
- 5. Principles that guide responsible online behavior
- 6. Copying someone else's work without giving credit
- 8. Protecting personal information online
- 9. Unauthorized access to computer systems
- 10. Fraudulent attempt to obtain sensitive information
- 12. A secret code used to access digital accounts
- 15. Malicious software designed to harm systems or data
- 16. Criminal activities carried out using computers or internet