Cyber Ethics

12345678910111213141516171819
Across
  1. 5. The act of turning encrypted data into readable text
  2. 9. The act of sending someone advertisements or fake emails continuously
  3. 11. The software that checks files for viruses
  4. 13. The built-in software of a computer that checks everything entering the computer for malware
  5. 15. Things that we use daily and need to update in order to have the latest features
  6. 17. It is necessary to keep a ______ of your files in order to not lose them
  7. 18. Data when it has some sort of meaning attached to it
  8. 19. The act of viewing others' private information, mainly through malware
Down
  1. 1. Someone who gains access to, encrypts, or deletes personal information
  2. 2. Illegal copying of copyrighted information
  3. 3. The act of stealing and misusing someone's personal information
  4. 4. The act of doing fraudulent/criminal activity on the internet
  5. 6. The track you leave when you browse the internet
  6. 7. Hackers can gain ______ to your private information without you knowing
  7. 8. The act of harassing someone on the internet
  8. 10. Someone who illegally copies and distributes paid software for free
  9. 12. The moral principles of the internet
  10. 14. The piece of text used to identify if the correct person is trying to log in
  11. 16. The policy that helps protect original works from plagiarism