Across
- 3. Doing the right thing online
- 4. Breaking a system's security to test or exploit it
- 6. Unauthorized use of someone else’s writing or work
- 8. Secret code to access a system
- 9. Credit must be given to this when using someone's work
- 13. Ethical use of the internet and digital resources
- 16. Legal protection for original digital content
- 17. Type of bullying that occurs via digital devices
- 18. Software designed to infiltrate or damage a computer system
- 20. Repetitive, unwanted emails often used for advertising
- 21. Trackable data collected about users
Down
- 1. Stealing and using someone else's online identity
- 2. Protective measure to block unauthorized access
- 3. Accessing data without permission
- 5. Security measure using a mix of letters, symbols, numbers
- 7. Intentional deception online
- 10. Protection of digital data from theft or damage
- 11. A lie or false claim spread online
- 12. Illegal copying or distribution of software
- 14. Moral principles in computing
- 15. Basic internet behavior standards
- 19. Type of malicious software that demands payment
