Cyber Laws & Ethics

1234567891011121314
Across
  1. 2. protect brands, logos, and symbols that distinguish goods or services
  2. 4. private browsing mode
  3. 7. the act of using someone else’s work or ideas without proper acknowledgment
  4. 8. Sending bulk emails
  5. 10. someone gains unauthorized access to a computer system or network
  6. 12. refers to safe and responsible use of ICT
  7. 13. protect new inventions or discoveries
  8. 14. scammers send fake emails or messages pretending to be someone trustworthy
Down
  1. 1. Internet etiquette
  2. 3. involves secretly listening to or intercepting private communications
  3. 5. remember our visits on website
  4. 6. a type of malicious software that locks or encrypts a victim’s data, demanding payment
  5. 9. data that is left behind when users have been online
  6. 11. illegal activities conducted through computers or the internet
  7. 12. people who deliberately post inflammatory or offensive comments online to provoke others