cyber security

12345678910111213141516171819
Across
  1. 2. Copying someone’s work and claiming it as your own.
  2. 4. Unwanted bulk emails sent to many people.
  3. 6. The online record you leave behind.
  4. 7. Ethical rules to follow while using the internet.
  5. 10. Illegal copying or sharing of software.
  6. 12. Unethical act of harassing someone online.
  7. 14. A person who breaks into systems.
  8. 15. Falsely pretending to be someone to steal info.
  9. 16. A person who breaks into systems to cause harm or steal data.
  10. 17. The unique ID every device has on a network.
  11. 18. A malicious program that spreads by itself.
  12. 19. Ethical use of technology and internet.
Down
  1. 1. Fake websites or emails used to trick users.
  2. 3. The act of accessing a system without permission.
  3. 5. A small file that stores user data in the browser.
  4. 7. A malicious trick where users click on invisible or disguised elements.
  5. 8. A legal right that protects original digital works.
  6. 9. A system that filters network traffic for safety.
  7. 11. Secret word used to access an account.
  8. 13. Transforming information to hide its meaning.