Cyber Ethics

123456789101112131415
Across
  1. 4. Unauthorized access to a computer system
  2. 10. Connects your computer to a available network
  3. 13. Harassment or intimidation using online communication
  4. 14. A security system that moniters and controls incoming and outgoing network traffic
  5. 15. The process of verifying the identity of a user or a device
Down
  1. 1. Criminal activity carried out using computers and networks
  2. 2. Softwares that protect against viruses and malware
  3. 3. A message designed to trick you into revealing information
  4. 5. The set of rules for appropriate online communication and behavior
  5. 6. An unauthorized access and/or use of sensitive or confidential data
  6. 7. The process of converting information into a code to protect it from unauthorized access
  7. 8. A strong password should be this
  8. 9. Software designed to cause harm
  9. 11. The right of an individual to control access to their personal information
  10. 12. A malicious software program designed to damage or disrupt a computer system