Cyber Ethics
Across
- 3. Converts the encrypted information into a readable form.
- 4. The process of transforming data into unreadable code.
- 7. Protects your brand name's logo, packaging, and other distinctive designs that identify and distinguish the products of one manufacturer.
- 10. The act of using or imitating the language and thoughts of another person as one's original work.
- 11. Criminal activities that involve the use of computers, network, and the internet connections with the intentions to cause harm to individuals.
- 12. Unwanted bulk emails coming from unknown sources.
- 15. An illegal intrusion into a computer system or network.
- 16. An act of harming or harassing a person through information technology
Down
- 1. A legal right granted by law to the creator for his original work.
- 2. A single licenced copy of a software is loaded into many computers contrary to the licence's terms.
- 5. A security system that prevents unauthorised people from accessing your system and network.
- 6. A right related to the new intentions that grants the inventor the sole right to make, use, and sell that intention for a specific period of time.
- 8. A term which is a combination of two terms,'net' and 'etiquette'.
- 9. A program or a set of programs that disrupts the normal functioning of a computer.
- 10. An act of sending an email to a user to mislead him.
- 13. A safety measure to minimise the chances of being hacked which is a combination of letters, numbers, and symbols.
- 14. The simplest way to prevent plagiarism.