Cyber Ethics

12345678910111213
Across
  1. 4. Encrypted data undergoes a process at receiver end.
  2. 6. A security system that prevents unauthorised people to access network.
  3. 8. A law prohibit others from creating a copy of work.
  4. 11. Criminal activities involve to use computer, network and internet..
  5. 12. How many characters are required to make a strong password?
  6. 13. Unwanted bulk e-mails come from unknown source.
Down
  1. 1. Most reliable method of data protection.
  2. 2. To protect the brand name's, logo, packaging etc.
  3. 3. In which process of transforming data into unreadable code ?
  4. 5. Keep secret and change periodically.
  5. 7. A digital footprint is also known as .....
  6. 9. Hacking done for good purpose, such as national security.
  7. 10. An illegal intrusion into a computer system or network.