Safety and Ethics Puzzle

123456789101112131415161718
Across
  1. 3. a set of data that describes and gives information about other data.
  2. 4. The information about a particular person that exists on the Internet as a result of their online activity
  3. 8. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. 9. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. 12. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. 15. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. 16. the use of electronic communication to bully a person
  8. 17. Protection of computer systems, networks, and data from digital attacks.
  9. 18. The protection of information from people who are not authorized to view it.
Down
  1. 1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. 2. A widely-accepted security measure that should be guaranteed in every secure system
  3. 5. having the ability to find information, evaluate information credibility, and use information effectively
  4. 6. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. 7. protecting your data online
  6. 10. Identity theft, stealing money, stealing private information, controlling private computers.
  7. 11. how company’s use your data
  8. 13. The assurance that systems and data are accessible by authorized users when and where needed
  9. 14. Aims at ensuring that information is protected from unauthorized or unintentional alteration