Cyber Ethics

12345678910111213141516
Across
  1. 3. Faking the source of data or communication.
  2. 7. Converting data into a form that is unreadable to unauthorized user
  3. 8. The illegal copying or distribution of copyrighted software
  4. 11. Software designed to damage or disable computers and computer systems.
  5. 12. Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, used in commerce.
  6. 13. The use of electronic communication to bully or harass someone.
  7. 14. Unsolicited and unwanted emails or messages
  8. 16. The act of stealing someone's personal information and using it to impersonate them.
Down
  1. 1. An acronym that stands for "Terms of Service
  2. 2. Measures taken to protect computer systems and data from unauthorized access or damage.
  3. 4. The right of individuals to control the collection and use of their personal information.
  4. 5. The legal right that grants the creator of an original work exclusive control over its use and distribution.
  5. 6. Unauthorized access to a computer or network
  6. 9. The doctrine that allows limited use of copyrighted material without permission for purposes such as criticism, commentary, or education.
  7. 10. An attempt to trick someone into revealing personal information, such as passwords or credit card details
  8. 15. personal data and information are kept secure and protected from unauthorized access or misuse.