Cyber Ethics

1234567891011121314151617181920
Across
  1. 2. Authentication method that adds a second layer of security
  2. 7. A person who posts offensive or disruptive comments online
  3. 11. Software that protects against viruses and malware
  4. 13. The trail of data a person leaves online
  5. 14. Pretending to be someone else online
  6. 17. A dishonest scheme meant to trick people online
  7. 18. Proper and respectful behavior on the internet
  8. 19. Software or hardware that blocks unauthorized access
  9. 20. Online harassment or abuse using digital platforms
Down
  1. 1. Method of converting data into unreadable code for security
  2. 3. Legal right that protects creative online content
  3. 4. Software that secretly gathers user information
  4. 5. Principles that guide responsible online behavior
  5. 6. Copying someone else's work without giving credit
  6. 8. Protecting personal information online
  7. 9. Unauthorized access to computer systems
  8. 10. Fraudulent attempt to obtain sensitive information
  9. 12. A secret code used to access digital accounts
  10. 15. Malicious software designed to harm systems or data
  11. 16. Criminal activities carried out using computers or internet