Browsing Safely

12345678910111213
Across
  1. 5. The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
  2. 6. An illegal entry into a computer system or network.
  3. 8. A collection of technologies, processes, and data from attack, damage, or unauthorised access.
  4. 9. It is an act of harming or harassing using information technology in a deliberate manner.
  5. 10. Act of stealing and misusing someone's personal information.
  6. 13. The receiver of a message is fooled into believing that message received by him is from a trusted source, which is actually not true.
Down
  1. 1. Any criminal activity intended to harm anyone using a computer and an internet connection.
  2. 2. Use of illegal methods to get money or other things that belong to a bank or its customers.
  3. 3. Used yo conduct terrorism through the use of computers and internet in order to cause fear and panic.
  4. 4. An impression you create when you engage in various online activities, like browsing, communicating with others, or uploading content.
  5. 7. A crime in which the victim is attacked first and then forced to pay money to stop further attacks.
  6. 11. The act of sending an email to a user; misleading him to believe that is from a trusted person or organisation.
  7. 12. A set of programs that disrupts the normal functioning of a computer.