Across
- 1. Self replicating program
- 3. Unsolicited emails
- 6. System overload
- 7. File encrypting malware
- 9. Uncredited Work
- 11. Exclusive rights
- 13. Disruptive behaviour
- 16. Computer ethics principles
- 17. Fake news creation
- 18. Unauthorized access
- 19. Junk messages
Down
- 2. Social Platforms
- 4. Sensitive info theft
- 5. Online protection
- 8. Internet politeness
- 10. Harmful software
- 12. Data privacy rights
- 14. Digital Currency
- 15. Online harassment
