Cyber Law (CIA Component 1)

12345678910
Across
  1. 2. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
  2. 4. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  3. 6. Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
  4. 7. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
  5. 8. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
  6. 9. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc. (Shortform)
  7. 10. ___________ was the most prominent cyber paternalistic scholar.
Down
  1. 1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
  2. 3. The adoption or increase in use of digital or computer technology by an organization, industry, country, etc.
  3. 5. It is often viewed as the act of sending unsolicited email usually commercial messages.