Cyber Ethics

12345678910111213141516
Across
  1. 3. A fake email that tricks you into giving personal info
  2. 5. Breaking a system's security to test or exploit it
  3. 8. Pretending to be someone else online
  4. 10. A small file that tracks your website activity
  5. 11. Taking someone else's work without credit
  6. 12. type of malware that is designed to spy on user activity.
  7. 14. The unauthorize use of copyrighted content
  8. 16. The trail of data you leave online
Down
  1. 1. The method of verifying your identity.
  2. 2. Prevents unauthorized access to or from a private network
  3. 4. Stealing and using someone else's online identity
  4. 6. Legal protection for original digital content
  5. 7. Makes judgement on cyber crimes.
  6. 9. A secret combination of characters that protects your account
  7. 13. Software that protects against malicious programs
  8. 15. Unwanted, irrelevant messages sent over internet, usually advertising or phishing.