civil law aspects of end-to-end digitalization

123456789101112131415161718192021222324252627282930313233
Across
  1. 4. The use of the Internet or other electronic means to stalk or harass an individual.
  2. 7. The unauthorized use of someone else’s computer to mine cryptocurrency.
  3. 10. An attack that overwhelms a system with traffic, rendering it inaccessible.
  4. 13. Unauthorized intrusion into a computer or a network.
  5. 14. The method by which information is converted into secret code that hides the information's true meaning.
  6. 15. A function used in blockchain to convert an input of letters and numbers into an encrypted output.
  7. 16. A set of rules to be followed in calculations or other problem-solving operations.
  8. 19. The very first block in a blockchain.
  9. 21. A network security system that monitors and controls incoming and outgoing network traffic.
  10. 22. A list of records linked together using special cryptographic operations across a distributed network of computers.
  11. 23. The process of executing and deploying a blockchain in a specific environment.
  12. 25. Protecting digital content creators' rights.
  13. 26. A device that forwards data packets along networks.
  14. 27. An identification string that defines a realm of administrative autonomy, authority or control within the internet.
  15. 30. A decentralized form of network structure central to blockchain technology.
  16. 32. The electronic equivalent of a handwritten signature, used to authenticate digital documents.
  17. 33. A key characteristic of blockchain, where no single entity has control over the entire network.
Down
  1. 1. A split in the blockchain where the chain diverges into two potential paths forward.
  2. 2. The process of validating new transactions and recording them on a blockchain.
  3. 3. A way for smart contracts on the blockchain to interact with data outside of their network.
  4. 5. Records of events that happen in an operating system or other software.
  5. 6. Determining which legal system applies in digital transactions.
  6. 7. The art of writing or solving codes, a key aspect of blockchain technology for ensuring secure transactions.
  7. 8. The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, credit card numbers, etc².
  8. 9. A type of malware that encrypts a victim's files and demands payment to restore access.
  9. 11. A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
  10. 12. A type of fraud where criminals trick individuals into providing sensitive data.
  11. 17. The loss of signal strength in networking cables or connections.
  12. 18. the theft of credit card information during online transactions.
  13. 20. An open-source, blockchain-based platform that enables developers to build and deploy decentralized applications.
  14. 22. The maximum rate of data transfer across a given path.
  15. 24. Any computer that connects to the blockchain network.
  16. 28. Malicious software designed to cause damage to a computer or network.
  17. 29. A record of all transactions that have taken place in a blockchain network.
  18. 31. A hardware or software component that stores data so future requests for that data can be served faster.