Across
- 4. It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- 6. It is an act ab harming or harassing using information technology in deliberate manner.
- 8. It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- 10. Standard form of vital information resources under seize.
- 13. It refer to the act of stealing and misusing someone's personal Plus information.
- 14. It referred to an illegal entry into a computer system or network.
- 15. It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- 1. ____ also known as unethical hacker.
- 2. A ____ is a software that help in preventing unauthorised access to your computer.
- 3. ____ means hoaxing or misleading.
- 5. _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- 7. ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- 9. ______ is a popular anti-virus.
- 11. _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- 12. Never share your ____ while chatting.
