Cybercrimes and Cyber Laws

123456789101112131415
Across
  1. 2. when someone operates a computer disrupting part of the national electronic infrastructure.
  2. 3. The use of IT to harm or harass other people in a deliberate, repeated, and hostile manner
  3. 5. Developing a program intended to damage or disable computers and their systems
  4. 6. disrupting, damaging, or destroying a website or computer network
  5. 10. adopting the identity of another computer user, or creating a false identity on a computer website in order to commit fraud.
  6. 12. Literary theft
  7. 13. Gaining unauthorized access to data in a computer or an entire network
  8. 15. Any criminal activity associated with a computer
Down
  1. 1. The control or suppression of what can be accessed, published, or viewed on the Internet.
  2. 2. using a computer to steal computer data stored in a digital format.
  3. 4. warfare, transmitting computer viruses to people to destroy their computer system or files.
  4. 7. fraudulent practice of sending emails that appear to be from reputable companies to induce individuals to reveal personal information, like passwords and credit card numbers.
  5. 8. area of law which concerns computer and computer-related crimes.
  6. 9. using a computer to steal computer data stored in a digital format.
  7. 10. tort, The invasion, theft, falsification, misuse, or deletion of data stored in a computer to commit a tort
  8. 11. Use of a variety of media, including photos, film, video, and video games depicting the engagement in acts of a sexual nature
  9. 14. theft, using a computer to steal financial, employment, educational, medical, and personal data.