Across
- 4. a program or set of programs that disrupts the normal functioning of a computer
- 5. the process of transforming data into unreadable code
- 8. the act of sending an email to a user, misleading him to believe that it is from trusted person or organisation
- 9. the criminal practice of using social influence over the telephone system, most often using features facilitated by voice over IP, to gain access to sensitive information
- 10. purchasing a single licenced copy of the software and load it onto several computers contrary to the licence's terms
- 14. the act of using or imitating the language an d thoughts of another person as one's original work
- 15. at the receiving end, the process of conversion of encrypted information into a readable form
Down
- 1. an act harming or harassing a person through information technology in deliberate manner
- 2. a legal right granted by the law to the creator for his original work
- 3. an illegal intrusion into a computer system or network
- 6. to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet
- 7. a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on
- 11. the technical people who are experts in breaking into systems to steal important data, such as financial details, passwords, etc
- 12. they are generally sent in large numbers for commercial advertising purposes
- 13. a right related to the new inventions that grants the inventor the sole right to make, use, and sell that invention for a specific period of time
