Across
- 2. It is a collection of technologies, processes and practices designed to protect network.
- 3. It is a process of befriending children on social media.
- 5. It is an act of harming using information technology in a delibrate manner.
- 7. It is used to conduct terrorism through the use of computers.
- 8. It is a computer program that is designed to identity, prevent, and remove viruses from a computer.
- 9. It is an impression you create when you engage in various online activities.
- 11. It harm anyone using a computer and an internet connection.
- 13. It refers to an illegal entry into a computer system or network.
Down
- 1. It is a program that disrupts the normal functioning of a computer.
- 2. They are also called unethical hackers.
- 4. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person.
- 5. It is a crime in which the victim is attacked first and forced to pay money to stop further attacks.
- 6. It refers to the act of stealing and misusing someone's personal information.
- 10. It is a software that helps in preventing unauthorized access to your computer.
- 12. It is the use of illegal methods to get money or other thins that belong to a bank.
