Cyber Ethics

12345678910111213141516171819202122
Across
  1. 1. Breaking a system's security to test or exploit it
  2. 3. Secret code to access a system
  3. 6. Protective measure to block unauthorized access
  4. 8. Repetitive, unwanted emails often used for advertising
  5. 11. A lie or false claim spread online
  6. 13. Type of bullying that occurs via digital devices
  7. 14. Security measure using a mix of letters, symbols, numbers
  8. 16. Legal protection for original digital content
  9. 18. Trackable data collected about users
  10. 21. Stealing and using someone else's online identity
  11. 22. Ethical use of the internet and digital resources
Down
  1. 2. Type of malicious software that demands payment
  2. 4. Illegal copying or distribution of software
  3. 5. Unauthorized use of someone else’s writing or work
  4. 7. Moral principles in computing
  5. 9. Software designed to infiltrate or damage a computer system
  6. 10. Protection of digital data from theft or damage
  7. 12. Intentional deception online
  8. 15. Basic internet behavior standards
  9. 17. Accessing data without permission
  10. 19. Doing the right thing online
  11. 20. Credit must be given to this when using someone's work