Across
- 1. Unauthorized access to systems, often unethical or illegal
- 8. Legal frameworks that regulate online conduct, data use, and cybercrimes
- 9. Impersonating someone or something digitally to trick users
- 11. Repeatedly using the internet to harass or intimidate someone
- 15. Hiding one’s identity online
Down
- 2. Using digital platforms to harass, threaten, or demean others
- 3. Copying someone else’s digital work without permission or credit
- 4. The right to control access to your personal information online
- 5. Criminal activities carried out using computers or the internet
- 6. Software that automatically displays or downloads advertising content
- 7. Downloading or distributing copyrighted digital content without authorization
- 10. Deceiving users to steal sensitive information via fake communication
- 12. Online etiquette
- 13. Securing information to protect it from unauthorized access
- 14. Falsely assuming another person’s identity online
