Cyber Ethics

12345678910111213141516
Across
  1. 5. Act of harming or harassing a person through information technology in a deliberate manner.
  2. 6. Highly technical people who secretly break into computers to steal important data or sometimes destroy it.
  3. 9. Legal right granted by the law to the creator for his original work.
  4. 13. Information and Communication Technology.
  5. 14. Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
  6. 15. Unwanted bulk emails for commercial advertising purpose.
  7. 16. Combination of two terms, 'net' and 'etiquette'.
Down
  1. 1. Converts the encrypted information into a readable form.
  2. 2. Act of using or imitating the language and thoughts of another person as one's original work.
  3. 3. Transforming data into unreadable code.
  4. 4. Act of sending an email to a user, misleading him to believe that it is from a trusted person or organisation.
  5. 7. Security system that prevents unauthorised people from accessing your system and network.
  6. 8. Equivalent term to hacking.
  7. 10. Programs Or set of programs that disrupts the normal functioning of the computer.
  8. 11. Technical people who are experts in breaking into systems to steal important data, such as financial details, passwords, etc.
  9. 12. Illegal intrusion into a computer system or network.