Across
- 2. IT IS A SOFTWARE THAT HELPS IN PREVENTING UNAUTHORISED ACCESS TO YOUR COMPUTER BY BLOCKING UNSOLICITED COMMUNICATION
- 7. IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONES PERSONAL INFORMATION
- 8. IT IS ANY CRIMINAL ACTIVITY INTENDED TO HARM ANYONE USING COMPUTER AND AN INTERET CONNECTION
- 11. IT IS THE ACT OF SENDING AN EMAIL TO A USER;MISLEADING HIM TO BELIEVE THAT IT IS FROM TRUSTED PERSON OR ORGANISATION
- 14. IT IS A CRIME IN WHICH THE VICTIM IS ATTACKED FIRST AND THEN FORCED TO PAY MONEYTO STOP FURTHER ATTACKS
- 15. IT IS THE PROCESS OF BEFRIENDS A CHILDREN ON SOCIAL MEDIA TO FACILITATE ONLINE OR PHISICAL SEXUAL ABUSE
- 16. IT IS THE USE IF ILLEGAL METHODS TO GET MONEY OTHER THINGS THAT BELONG TO A BANK OR ITS CUSTOMERRS
Down
- 1. THEY WRITE OR USE READYMADE COMPUTER PROGRAMS TO ATTACK THE TARGET COMPUTER
- 3. IN IT THE RECEIVER OF A MESSAGE IS FOOLED INTO BELIEVING THAT THE MESSAGE RECIEVED BY HIM FROM A TRUSTED SOURCE WHICH IS ACTUALLY NOT TRUE
- 4. IT IS A COMPUTER PROGRAM THAT IS DESIGNED TO IDENTIFY,PREVENT,REMOVE VIRUSES FROM A COMPUTER
- 5. IT IS A COLLECTION OF TECHNOLOGIES,PROCESS,AND PRACTICES DESIGNED TO PROTECT NETWORKS,COMPUTER,PROGRAMS,AND DATA FROM ATTACK,DAMAGE,OR UNATHORISED ACCESS
- 6. IT IS AN ACT OF HARMING OR HARASSING USING INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- 9. THEY ARE CALLED UNETHICAL HACKERS
- 10. IT REFERS TO AN ILLEGAL ENTRY INTO A COMPUTER SYSTEM OR A NETWORK
- 12. IT IS A PROGRAM O A SET OF PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER
- 13. IT IS USED TO CONDUCT TERRORISM THROUGH THE USE OF COMPUTERS AND INTERNET IN ORDER TO CAUSE FEAR AND PANIC
