Across
- 3. When someone lies or tricks others to get money, property, or an unfair advantage.
- 4. A set of rules and proper behavior expected from individuals when interacting with other users online.
- 7. Tye act of using someone else's words, ideas, or work without giving proper credit.
- 9. Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
- 11. A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
- 13. When someone takes a website name that belongs to someone else.
- 15. Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
- 1. The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
- 2. Individual pieces of information.
- 5. A cyber attack that takes users to fake websites to steal personal information.
- 6. Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
- 8. When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
- 10. The right to keep your personal information, actions, or space protected from others' access or interference.
- 12. A type of malicious software that spreads itself through networks without needing to attach to other programs.
- 14. A global network that connects computers and allows people to share information and communicate.
