RU ITEC411 – Cyber Ethics and Privacy

123456789101112131415161718192021222324
Across
  1. 2. Limited legal use of copyrighted materials
  2. 3. Moving business operations to another country
  3. 5. Legal protection for creators of original works
  4. 9. Identification using unique physical characteristics
  5. 10. Unsolicited mass electronic messages
  6. 11. Small file stored by websites to track users
  7. 12. Redirecting users to fake websites through DNS manipulation
  8. 14. Tool used to hide a user’s identity online
  9. 16. Program that secretly records keystrokes
  10. 18. Spoken defamation
  11. 19. Analyzing data to predict behavior
  12. 20. Security system designed to attract hackers
  13. 21. Written defamation
  14. 24. Equal treatment of internet traffic
Down
  1. 1. Analyzing large datasets to find patterns
  2. 4. Hacking used to promote political or social causes
  3. 6. Converting data into unreadable form for security
  4. 7. Fraudulent messages used to steal personal information
  5. 8. Working remotely using computer networks
  6. 11. Law against unauthorized computer access
  7. 13. Monitoring activity or communications
  8. 15. The right of individuals to control how their personal information is used
  9. 17. Overloading a system with traffic to shut it down
  10. 22. Software designed to damage or infiltrate computers
  11. 23. Technology that controls use of digital content