cyber ethics and security

123456789101112131415
Across
  1. 6. It is a law under which the owners are granted certain exclusive rights to ensure that the creator's hardwork is safe and protected from unauthorized copying and piracy.
  2. 7. It is a wireless technology used to interconnect mobile phones, computers and printers.
  3. 8. It refers to an illegal intrusion into a computer system or network.
  4. 10. It is a combination of two terms, net and etiquette.
  5. 12. You purchased a single licensed copy of the software and load it into several computers contrary to the license's terms.
  6. 13. It refers to unwanted bulk emails that come from unknown sources.
  7. 14. It connects two or more computers located at distant places.
  8. 15. It is the criminal practice of using social influences over the telephone system, most often using VoIP.
Down
  1. 1. This device connects two different types of networks with each other.
  2. 2. It refers to criminal activities that involve the use of computers, networks and the internet connection with the intent to cause harm to individuals or their digital devices.
  3. 3. It refers to a computer network restricted to an organization.
  4. 4. These are unethical people who are experts in breaking into systems to steal important data.
  5. 5. It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc. are connected and communicate with each other.
  6. 9. It refers to the act of using or imitating the language and thoughts of another person as one's original work.
  7. 11. It enables you to connect your computer to the available internet connection over the existing telephone lines.