CYBER ETHICS - 2

1234567891011121314151617
Across
  1. 1. is a type of phishing attacks
  2. 3. is the combination of net and etiquette
  3. 4. are defined as the legal rules
  4. 6. refers to an illegal intrusion into a computer system or network.
  5. 9. refers to the act of using or imitating the language
  6. 12. refers to several computers loaded to the contrary licence terms
  7. 13. refers to criminal activities that involve the use of computers
  8. 16. is the criminal practice of using social influence
  9. 17. is a malicious technique
Down
  1. 2. refers to when someone copies a file and distribute them illegally
  2. 5. refers to unwanted bulk emails that come from from unknown sources.
  3. 7. is a practice which is a practice of sending bulk mails till the mail server gets full
  4. 8. is a digital footprint
  5. 10. is an integral part and parcel of our life.
  6. 11. is a security system preventing unauthorised people to access your system
  7. 14. is an equivalent term to hacking
  8. 15. is the combination of voice and phishing