Cyber Ethics

12345678910111213141516
Across
  1. 3. The term is a combination of "VOICE" and "PHISHING".
  2. 6. An act of harming or harassing a person through technology.
  3. 8. An impression about a person that exists due to their online activity.
  4. 10. The process of transferring data into an unreadable form.
  5. 14. The other name of digital footprint.
  6. 15. Refers to an illegal intrusion into a computer system or network.
  7. 16. Hacking done for good cause, such as national security.
Down
  1. 1. Malicious technique of tricking a user into clicking a web disguised as another.
  2. 2. It is an act of sending email from a trusted name to mislead someone.
  3. 4. The process of transferring data into readable form again.
  4. 5. A practice of sending emails in a bulk to complete the memory.
  5. 7. An act of stealing and misusing someone's personal information.
  6. 9. A fraud done to obtain money using a authorize name.
  7. 11. It is a program or a set of programs that breaks the functioning of a device.
  8. 12. Defined as the legal rules and restrictions imposed on online users.
  9. 13. A security system that prevents unauthorized people from accessing a device.