Web Ethics & Safety

12345678910111213141516171819202122
Across
  1. 2. abusive purposes
  2. 5. in order to impersonate him or her for financial gain
  3. 7. tasks over the Internet
  4. 11. which occurs when someone’s personal and financial information is
  5. 13. through which hackers can gain access to a computer
  6. 15. Engineering Vector
  7. 17. Virus
  8. 18. of computers, cell phones or other electronic devices to deliberately and
  9. 21. Theft
  10. 22. distribution or forwarding of a message which includes sexually
Down
  1. 1. of computers controlled by users other than their owners to perform
  2. 3. refers to someone who is an expert at computer programming and
  3. 4. is able to solve computer problems, but also means someone who
  4. 6. harm another person through the Internet
  5. 8. Internet user who uses social networking sites, chat rooms or other
  6. 9. Scam
  7. 10. which involves stealing personal information for financial gain through
  8. 12. materials through a computer, cell phone or other electronic device
  9. 14. program which replicates and spreads itself from one computer to
  10. 16. gains access to others’ computer for their own profits
  11. 19. Predator
  12. 20. to approach and eventually hurt other people, usually for sexual or