Cyber Ethics

12345678910111213141516
Across
  1. 3. Converts the encrypted information into a readable form.
  2. 4. The process of transforming data into unreadable code.
  3. 7. Protects your brand name's logo, packaging, and other distinctive designs that identify and distinguish the products of one manufacturer.
  4. 10. The act of using or imitating the language and thoughts of another person as one's original work.
  5. 11. Criminal activities that involve the use of computers, network, and the internet connections with the intentions to cause harm to individuals.
  6. 12. Unwanted bulk emails coming from unknown sources.
  7. 15. An illegal intrusion into a computer system or network.
  8. 16. An act of harming or harassing a person through information technology
Down
  1. 1. A legal right granted by law to the creator for his original work.
  2. 2. A single licenced copy of a software is loaded into many computers contrary to the licence's terms.
  3. 5. A security system that prevents unauthorised people from accessing your system and network.
  4. 6. A right related to the new intentions that grants the inventor the sole right to make, use, and sell that intention for a specific period of time.
  5. 8. A term which is a combination of two terms,'net' and 'etiquette'.
  6. 9. A program or a set of programs that disrupts the normal functioning of a computer.
  7. 10. An act of sending an email to a user to mislead him.
  8. 13. A safety measure to minimise the chances of being hacked which is a combination of letters, numbers, and symbols.
  9. 14. The simplest way to prevent plagiarism.