Across
- 4. Encrypted data undergoes a process at receiver end.
- 6. A security system that prevents unauthorised people to access network.
- 8. A law prohibit others from creating a copy of work.
- 11. Criminal activities involve to use computer, network and internet..
- 12. How many characters are required to make a strong password?
- 13. Unwanted bulk e-mails come from unknown source.
Down
- 1. Most reliable method of data protection.
- 2. To protect the brand name's, logo, packaging etc.
- 3. In which process of transforming data into unreadable code ?
- 5. Keep secret and change periodically.
- 7. A digital footprint is also known as .....
- 9. Hacking done for good purpose, such as national security.
- 10. An illegal intrusion into a computer system or network.
