Browsing safely

123456789101112131415
Across
  1. 4. It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
  2. 6. It is an act ab harming or harassing using information technology in deliberate manner.
  3. 8. It is the process of befriending children on social media to facilitate online or physical sexual abuse.
  4. 10. Standard form of vital information resources under seize.
  5. 13. It refer to the act of stealing and misusing someone's personal Plus information.
  6. 14. It referred to an illegal entry into a computer system or network.
  7. 15. It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
  1. 1. ____ also known as unethical hacker.
  2. 2. A ____ is a software that help in preventing unauthorised access to your computer.
  3. 3. ____ means hoaxing or misleading.
  4. 5. _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
  5. 7. ____ is any criminal activity intended to harm anyone using a computer and internet connection.
  6. 9. ______ is a popular anti-virus.
  7. 11. _______ is the use of illegal method to get money or other things that belong to bank or its customers.
  8. 12. Never share your ____ while chatting.