Cyber ethics and networking

123456789101112131415161718
Across
  1. 2. A secret word to access systems
  2. 5. Always log out of ____ after use
  3. 6. Act of pretending to be someone else online
  4. 7. A rule that controls data transmission
  5. 10. Software designed to protect against viruses
  6. 13. Repeated online harassment
  7. 15. Someone who uses tech to harm others
  8. 16. Common wireless security protocol
  9. 18. A global system of interconnected networks
Down
  1. 1. Helps to convert domain names to IP address
  2. 2. Never share your ____ with strangers
  3. 3. Unsolicited email or messages
  4. 4. Think before you ____ online
  5. 7. Connecting to someone's Wi-Fi without permission
  6. 8. Connects computers in a small area
  7. 9. Protects private data on a network
  8. 11. address The unique address of a device on a network
  9. 12. Online behaviour guidelines
  10. 14. Avoid clicking these in suspicious emails
  11. 17. Device that forwards data pockets