Cyber Ethics

123456789101112131415161718192021
Across
  1. 3. Doing the right thing online
  2. 4. Breaking a system's security to test or exploit it
  3. 6. Unauthorized use of someone else’s writing or work
  4. 8. Secret code to access a system
  5. 9. Credit must be given to this when using someone's work
  6. 13. Ethical use of the internet and digital resources
  7. 16. Legal protection for original digital content
  8. 17. Type of bullying that occurs via digital devices
  9. 18. Software designed to infiltrate or damage a computer system
  10. 20. Repetitive, unwanted emails often used for advertising
  11. 21. Trackable data collected about users
Down
  1. 1. Stealing and using someone else's online identity
  2. 2. Protective measure to block unauthorized access
  3. 3. Accessing data without permission
  4. 5. Security measure using a mix of letters, symbols, numbers
  5. 7. Intentional deception online
  6. 10. Protection of digital data from theft or damage
  7. 11. A lie or false claim spread online
  8. 12. Illegal copying or distribution of software
  9. 14. Moral principles in computing
  10. 15. Basic internet behavior standards
  11. 19. Type of malicious software that demands payment