Cyber Ethics

1234567891011121314151617181920
Across
  1. 2. Prevents unauthorized access to or from a private network
  2. 4. A safe, protected digital environment
  3. 6. The trail of data you leave online
  4. 7. Secure tunnel for online privacy
  5. 9. Keeping personal data safe from misuse
  6. 12. The act of intentionally hurting others online
  7. 14. Rules of right and wrong in the digital world
  8. 17. A good hacker who helps protect systems by finding and security flaws
  9. 18. Pretending to be someone else online
  10. 20. Telling a trusted adult about unethical behavior
Down
  1. 1. A small file that tracks your website activity
  2. 3. Software that protects against malicious programs
  3. 5. Your online identity or login name
  4. 8. Taking someone else's work without credit
  5. 10. The process of verifying identity
  6. 11. Software that secretly gathers user info
  7. 13. Harmful software that damages systems
  8. 15. Asking for someone's okay before posting their photo
  9. 16. A secret combination of characters that protects your account
  10. 19. A fake email that tricks you into giving personal info