Across
- 5. PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE
- 7. PROCESS OF TRANSFORMING ENCRYPTED INFORMATION INTO READABLE FORM
- 8. NETWORK DEVICE USED TO CONNECT ALL COMPUTERS IN A NETWORK WITH EACH OTHER
- 9. PROGRAM THAT DISRUPTS NORMAL FUNCTIONING OF COMPUTER
- 11. ACT OF USING OR IMITATING THE LANGUAGE AND THOUGHTS OF ANOTHER PERSON AS ONE'S ORIGINAL WORK
- 12. IT CONVERTS DIGITAL SIGNALS OF A COMPUTER INTO ANALOG SIGNALS TO ENABLE THEIR TRANSMISSION VIA PHONE LINES
- 14. SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- 15. ACT OF SENDING AN EMAIL TO USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
Down
- 1. EACH COMPUTER IN A NETWORK
- 2. IT PROVIDES A DIRECT CONNECTION BETWEEN SOURCE AND DESTINATION
- 3. ILLEGAL INTRUSION INTO COMPUTER SYSTEM OR NETWORK
- 4. DEVICE THAT CONNECTS TWO DIFFERENT TYPES OF NETWORKS WITH EACH OTHER
- 6. ACT OF HARMING OR HARRASSING A PERSON THROUGH INFORMATION TECHNOLOGY
- 10. UNWANTED BULK EMAILS COMING FROM UNKNOWN SOURCES
- 13. COMPUTER NETWORK MAINLY CREATED FOR INDIVIDUAL PERSON
