Cyber Ethics
Across
- 2. are technical people who are experts in breaking into systems to steal important data, password,etc
- 3. it is the process of transforming data into unreadable code.
- 5. it is a program that disrupts the normal functioning of a computer.
- 9. it refers to an illegal intrusion into a computer system or network.
- 10. it is a security system that prevents unauthorised people from accessing your system and network.
- 11. it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- 13. it is an act of harming a person through information technology in a deliberate manner.
- 15. it refers to criminal activities that involve the use of computers,networks and etc.
Down
- 1. it this process the encrypted information convert into a unreadable from.
- 4. it is a criminal practice of using social influence over the telephone system.
- 6. it refers to unwanted bulk emails that come from unknown sources.
- 7. it is An act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
- 8. it is the combination of two words malicious and software.
- 12. it is a malicious technique of tricking a we'd user into clicking something different from what the user perceives he/she is clicking on.
- 14. it is the combination of two terms,'net' and 'ettiquette'.