Vocab E-Ethics

12345678910111213141516171819202122232425
Across
  1. 1. modifying electronics such as an Xbox®, cell phone, or iPod®
  2. 5. Theft when someone steals personal information to commit fraud or other crimes
  3. 7. take advantage of kids by using instant messaging, e-mail and social network sites
  4. 9. someone who illegally alters computer hardware or breaches computer systems
  5. 10. (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
  6. 13. States Computer Emergency Readiness Team (USCERT)- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
  7. 15. involves fraudulent e-mails pretending to originate from banks or online O
  8. 20. Trafficking the illegal obtaining, giving or selling of passwords
  9. 21. Way to protect a written IP
  10. 22. an individual who alters electronics legally
  11. 23. refer to TV, radio or the Internet; means of communication
  12. 24. Harassment online harassment; can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening
  13. 25. nature
Down
  1. 2. Internet harassment
  2. 3. software programs which spread from computer to computer and are malicious
  3. 4. Trade Commission federal regulatory body which monitors and deals with identity theft
  4. 6. such as eBay® or PayPal®
  5. 8. This is used to protect our IP symbols
  6. 11. any crime involving computers
  7. 12. Amendment designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  8. 14. security measure used on today’s Internet which insures the data is secure
  9. 16. Mail a form of cybercrime where offensive letters are sent through e-mail
  10. 17. the illegal stealing, copying or spreading of media including software, movies and music
  11. 18. software installed discreetly which alters the usability of a computer
  12. 19. Fraud stealing money or property using interstate wire communication; considered a federal crime
  13. 20. Used to protect designed (say an invention or a door knob) IP