CYBER ETHICS

123456789101112131415161718
Across
  1. 2. Unwanted and often harmful bulk emails. |
  2. 3. Online etiquette or good manners on the internet. |
  3. 9. Legal right granted to an inventor for a new invention. |
  4. 11. Installing one licensed software copy on multiple devices illegally. |
  5. 14. Theft Stealing someone's personal information for fraudulent use. |
  6. 15. Illegally breaking into systems to steal sensitive information. |
  7. 17. Illegal intrusion into a computer system or network. |
  8. 18. Footprint Online data left behind from a user's digital activity. |
Down
  1. 1. Using technology to harass or harm someone on purpose. |
  2. 2. Piracy Copying and distributing software illegally. |
  3. 4. Not morally correct or acceptable, especially in the digital world. |
  4. 5. Tricking users into clicking something they didn't intend to. |
  5. 6. Presenting someone else's work or ideas as your own. |
  6. 7. Legal protection for original creative work. |
  7. 8. Using phone calls or VoIP to steal personal information. |
  8. 9. Attempting to trick someone into revealing personal info via fake emails. |
  9. 10. A program that disrupts a computer's normal functioning. |
  10. 12. Criminal activity involving computers, networks, or the internet. |
  11. 13. Bombing Sending repeated spam to overflow someone’s inbox. |
  12. 16. Law Rules and restrictions imposed on online users. |