Cyber Ethics

123456789101112131415
Across
  1. 2. are technical people who are experts in breaking into systems to steal important data, password,etc
  2. 3. it is the process of transforming data into unreadable code.
  3. 5. it is a program that disrupts the normal functioning of a computer.
  4. 9. it refers to an illegal intrusion into a computer system or network.
  5. 10. it is a security system that prevents unauthorised people from accessing your system and network.
  6. 11. it refers to the act of using or imitating the language and thoughts of another person as one's original work.
  7. 13. it is an act of harming a person through information technology in a deliberate manner.
  8. 15. it refers to criminal activities that involve the use of computers,networks and etc.
Down
  1. 1. it this process the encrypted information convert into a unreadable from.
  2. 4. it is a criminal practice of using social influence over the telephone system.
  3. 6. it refers to unwanted bulk emails that come from unknown sources.
  4. 7. it is An act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
  5. 8. it is the combination of two words malicious and software.
  6. 12. it is a malicious technique of tricking a we'd user into clicking something different from what the user perceives he/she is clicking on.
  7. 14. it is the combination of two terms,'net' and 'ettiquette'.