Navigating the Web of Cyber Law

123456789
Across
  1. 2. A violation of privacy where an individual's data is exposed or stolen.
  2. 4. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
  3. 5. A legal framework that governs the use of electronic signatures in contracts.
  4. 7. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
  5. 9. The unauthorized copying or distribution of software or digital content.
Down
  1. 1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
  2. 3. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  3. 5. A method of writing in code so that only authorized parties can access it.
  4. 6. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
  5. 8. The unlawful act of accessing a computer system without authorization.