cyber ethics

123456789101112131415
Across
  1. 4. are small text files stored on your computer by web browsers when you visit websites.
  2. 5. it is an act of harming or harassing through information technology in deliberate manner.
  3. 6. in this type of attack a piece of malicious code is installed on a computer server it misdricts the users to fraudulent website.
  4. 7. is a secret combination of characters (letters, numbers, and symbols) used to verify your identity.
  5. 9. refers to a copy of important data stored in an alternative location to ensure recovery in case the original data is lost or corrupted.
  6. 10. is ay illegal activity done through internet.
  7. 12. is a type of cybercrime that involves threatening or coercing individuals or organizations to pay money or provide some other response in exchange for stopping an attack or regaining access to their data.
  8. 13. is used as a form of identification and access control.
  9. 14. is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
  10. 15. also known as domain squatting, refers to the practice of registering, trafficking in, or using an Internet domain name with a bad faith intent to profit from the goodwill of a trademark belonging to someone else.
Down
  1. 1. it is the creation of malicious program to perform harmful task.
  2. 2. when an attacker harasses a victim through social media platform.
  3. 3. it is the action of forging a copy or imitation of a document, signature, banknote, or work of art
  4. 8. is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
  5. 11. it is an act of sending an email; misleading him to belive that it came from trusted source.