Browsing safety

1234567891011121314
Across
  1. 1. unethical hackers
  2. 2. :- A software that helps in
  3. 5. :- Collection oftechnologies, processes and practices designed to protect networks computers programs and data from your attack damage or another access.
  4. 7. :- Computer program that is designed to identify, prevent, and remove viruses from a computer.
  5. 10. and misusing someone's personal information.
  6. 12. unauthorised access to your computer by blocking unsolicited communication.
  7. 13. Theft :- Refers to the act of
  8. 14. Frauds :- Use of illegal method to get money or other things that belong to a bank or its customers.
Down
  1. 1. :- Act of farmingor harising using information technology in deliberate manner.
  2. 3. :- Program or set a program that disrupt the normal functioning of a computer.
  3. 4. :- cyber grooming isthe process of 'befriending' children on social media to facillate online or physical sexual abuse.
  4. 6. :- Collection oftechnologies, processes and practices designed to protect us from cybercrime
  5. 8. :- Refers to an illegal entry into computer system or network.
  6. 9. :- Act of sending any mailto user misleading him to believe that it is from a trusted person or organisation.
  7. 11. spoofing :- Hoaxing or misleading in it,the receive tor a message is fooled into believing that the message is received from trusted source