Across
- 5. Act of harming or harassing a person through information technology in a deliberate manner.
- 6. Highly technical people who secretly break into computers to steal important data or sometimes destroy it.
- 9. Legal right granted by the law to the creator for his original work.
- 13. Information and Communication Technology.
- 14. Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- 15. Unwanted bulk emails for commercial advertising purpose.
- 16. Combination of two terms, 'net' and 'etiquette'.
Down
- 1. Converts the encrypted information into a readable form.
- 2. Act of using or imitating the language and thoughts of another person as one's original work.
- 3. Transforming data into unreadable code.
- 4. Act of sending an email to a user, misleading him to believe that it is from a trusted person or organisation.
- 7. Security system that prevents unauthorised people from accessing your system and network.
- 8. Equivalent term to hacking.
- 10. Programs Or set of programs that disrupts the normal functioning of the computer.
- 11. Technical people who are experts in breaking into systems to steal important data, such as financial details, passwords, etc.
- 12. Illegal intrusion into a computer system or network.
