Cyber Law (CIA Component 1)

12345678910
Across
  1. 2. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
  2. 4. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  3. 6. Regulatory __________, seen as a problem for authorities who attempt to capture activities within the web, however it is also seen as a solution to the problems of excessive or inappropriate regulation as it aims in limiting the capacities and boundaries of authorities.
  4. 7. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
  5. 8. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
  6. 9. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc.
  7. 10. ___________ was the most prominent cyber paternalistic scholar
Down
  1. 1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
  2. 3. The process where companies, indutries, countries, etc increase the use of digital or computer technology.
  3. 5. The act of sending unsolicited emails which are usually commercial messages.