Cyber Ethics

123456789101112131415161718
Across
  1. 2. Action to prevent someone from contacting you online
  2. 5. A dishonest scheme to trick someone online
  3. 9. A secret word used for logging in
  4. 11. Repeating someone's work without credit
  5. 13. Threatening someone online
  6. 14. An identity used to log into online accounts
  7. 16. A system that blocks unauthorized access to a network
  8. 18. Measures taken to protect devices and data
Down
  1. 1. A file or program that can harm your computer
  2. 3. Permission given to share personal data
  3. 4. Illegal access to someone’s computer
  4. 6. Browsing the internet casually
  5. 7. Keeping your online identity safe
  6. 8. Platforms like Facebook, Instagram, and Twitter
  7. 10. Monitoring users’ activity on websites
  8. 12. What you must do after using a public computer
  9. 15. The process of converting data into a secure code
  10. 17. What you should do if you see cyberbullying