Cyber Ethics

123456789101112131415
Across
  1. 2. It refers to criminal activity that involve the use of computers, network and the internet connection with the intend to cause harm to individuals or their digital devices
  2. 7. It means accessing the Internet in an illegal manner
  3. 10. They are highly technical people who secretly break into computers to steal important data or sometimes to destroy it
  4. 13. It the process of transforming data into unreadable code
  5. 14. It refers to the act if using or imitating the language and thought of another person as ones original work
  6. 15. While using the internet, we need to follow certain moral rules, which includes honesty, respecting the privacy of others, and the property rights. These rules are called
Down
  1. 1. Sometimes, spam attackers keep sending bulk mails till the mail server gets full this practice is known as
  2. 3. It is the process which convert the encrypted information into a readable form
  3. 4. It is a process in which we purchase a single licensed copy of the software and load it into several computers contrary to licences term.
  4. 5. Hacking which is done a good cause, such as national security, is known as
  5. 6. the original writer and the source from which the material has been taken is essential and is known as
  6. 8. When software is copied and distributed illegally it is called
  7. 9. It is a security system that prevent unauthorised people from accessing your system and network
  8. 11. It refers unwanted bulk emails that come from unknown sources
  9. 12. It refers to an illegal intrusion into a computer system or network