Web ethics and safety

12345678910111213141516171819202122232425
Across
  1. 2. A device which monitors network activities for attacks and produces reports to a management station
  2. 7. the process of rearranging the data on a storage medium, such as a hard disk drive (HDD), for efficient storage and access.
  3. 8. Someone who is an expert at fixing and preparing computers, but they can also illegally gain access to other people's computers for their own profits.
  4. 9. A network controller which connects devices and allows effective communication between these devices.
  5. 13. An internet user, who uses sites, chat rooms, or other cyberspace to hurt people for sexual or abusive purposes.
  6. 17. used by software developers and proprietary software companies to prevent the unauthorized copying of their software.
  7. 20. malware, that spreads between computers and causes damage to data and software.
  8. 21. collection of computers controlled by users other than their own to perform automated tasks over the internet.
  9. 24. Fraud which involves stealing personal information for financial gain through email.
  10. 25. Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Down
  1. 1. Software designed to protect computers from viruses.
  2. 3. a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
  3. 4. ownership of any creative work or invention
  4. 5. a security program designed to prevent, detect, search and remove types of malware from computers, networks and other devices.
  5. 6. a word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
  6. 10. bad hackers
  7. 11. Exception to copyright infringement.
  8. 12. Computer device which forwards data packets from one network to another.
  9. 14. when a criminal uses someone else's personal information to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
  10. 15. use of computers cellphones or other electronics devices to harm another person through the internet
  11. 16. good hackers
  12. 18. the practice of taking someone else's work or ideas and passing them off as one's own.
  13. 19. a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.
  14. 22. A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
  15. 23. Unauthorized reproduction or distribution of copyright materials.