Cyber Ethics
Across
- 3. The term is a combination of "VOICE" and "PHISHING".
- 6. An act of harming or harassing a person through technology.
- 8. An impression about a person that exists due to their online activity.
- 10. The process of transferring data into an unreadable form.
- 14. The other name of digital footprint.
- 15. Refers to an illegal intrusion into a computer system or network.
- 16. Hacking done for good cause, such as national security.
Down
- 1. Malicious technique of tricking a user into clicking a web disguised as another.
- 2. It is an act of sending email from a trusted name to mislead someone.
- 4. The process of transferring data into readable form again.
- 5. A practice of sending emails in a bulk to complete the memory.
- 7. An act of stealing and misusing someone's personal information.
- 9. A fraud done to obtain money using a authorize name.
- 11. It is a program or a set of programs that breaks the functioning of a device.
- 12. Defined as the legal rules and restrictions imposed on online users.
- 13. A security system that prevents unauthorized people from accessing a device.