Across
- 5. IT IS A COLLECTION OF TECHNOLOGIES,PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS,COMPUTERS,PROGRAMS, AND DATA FROM ATTACK OR DAMAGE
- 6. IT IS AN IMPRESSION WHEN ENGAGE IN VARIOUS ONLINE ACTIVITIES LIKE BROWSING,COMMUNICATING ETC.
- 7. IT IS USED TO CONDUCT TERRORISM THROUGH THE USE OF COMPUTER AND INTERNET TO CAUSE FEAR AND PANIC
- 10. IT IS A CRIME IN WHICH VICTIM IS ATTACKED FIRST AND THEN FORCED TO PAY MONEY TO STOP FURTHER ATTACKS
- 11. IT IS A CRIMINAL ACTIVITY INTENDED TO HARM ANYONE USING INTERNET AND COMPUTER
- 12. IN THIS PROCESS TO FOOL ANYONE TO BE FROM A BANK AND TRICK PEOPLE INTO GIVING THEM MONEY
- 13. IT MEANS HOAXING OR MISLEADING
- 14. SET OF PROGRAMS THAT HAMPER THE NORMAL FUNCTIONING OF COMPUTER
- 15. IT IS A SOFTWARE THE HELPS IN PREVENTING UNAUTHORIZED ACCESS TO YOUR COMPUTER
Down
- 1. THEY ARE CALLED 'UNETHICAL HACKERS'
- 2. IT IS THE PROCESS OF 'BEFRIENDING' CHILDREN ON SOCIAL MEDIA TO FACILITATE ONLINE OR PHYSICAL SEXUAL ABUSE
- 3. IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION.
- 4. IT REFERS TO ILLEGAL ENTRY OF SOMEONE'S COMPUTER SYSTEM OR NETWORK
- 8. IT IS AN ACT OF HARMING OR HARASSING ANYONE USING INFORMATION TECHNOLOGY
- 9. IT IS A COMPUTER PROGRAM THAT IS DESIGNED TO IDENTIFY,PREVENT,AND REMOVE VIRUSES FROM COMPUTER
