Across
- 5. The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
- 6. An illegal entry into a computer system or network.
- 8. A collection of technologies, processes, and data from attack, damage, or unauthorised access.
- 9. It is an act of harming or harassing using information technology in a deliberate manner.
- 10. Act of stealing and misusing someone's personal information.
- 13. The receiver of a message is fooled into believing that message received by him is from a trusted source, which is actually not true.
Down
- 1. Any criminal activity intended to harm anyone using a computer and an internet connection.
- 2. Use of illegal methods to get money or other things that belong to a bank or its customers.
- 3. Used yo conduct terrorism through the use of computers and internet in order to cause fear and panic.
- 4. An impression you create when you engage in various online activities, like browsing, communicating with others, or uploading content.
- 7. A crime in which the victim is attacked first and then forced to pay money to stop further attacks.
- 11. The act of sending an email to a user; misleading him to believe that is from a trusted person or organisation.
- 12. A set of programs that disrupts the normal functioning of a computer.
