CYBER ETHICS

123456789101112131415
Across
  1. 4. a program or set of programs that disrupts the normal functioning of a computer
  2. 5. the process of transforming data into unreadable code
  3. 8. the act of sending an email to a user, misleading him to believe that it is from trusted person or organisation
  4. 9. the criminal practice of using social influence over the telephone system, most often using features facilitated by voice over IP, to gain access to sensitive information
  5. 10. purchasing a single licenced copy of the software and load it onto several computers contrary to the licence's terms
  6. 14. the act of using or imitating the language an d thoughts of another person as one's original work
  7. 15. at the receiving end, the process of conversion of encrypted information into a readable form
Down
  1. 1. an act harming or harassing a person through information technology in deliberate manner
  2. 2. a legal right granted by the law to the creator for his original work
  3. 3. an illegal intrusion into a computer system or network
  4. 6. to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet
  5. 7. a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on
  6. 11. the technical people who are experts in breaking into systems to steal important data, such as financial details, passwords, etc
  7. 12. they are generally sent in large numbers for commercial advertising purposes
  8. 13. a right related to the new inventions that grants the inventor the sole right to make, use, and sell that invention for a specific period of time