Across
- 2. It refers to criminal activities that involve the use of computers , networks , and the internet connections with the intent to harm someone or their digital devices
- 5. It refers to unwanted bulk that comes from unauthorized sources
- 8. This refers to an act of stealing and misusing someone's personal information
- 11. It is a malicious technique of tricking a web user into clicking on something different from what the user perceives or clicking on
- 15. It means protecting the data and resources from any unauthorized access
- 16. It refers of being aware of the ethical practices and behaving responsibly while using internet
- 17. A synonym of digital footprint
- 19. It can be defined as the legal rules and restrictions imposed on online users
Down
- 1. A practice of sending bulk mails by a spam attacker till the mail server gets full
- 2. This is an equivalent term of hacking
- 3. It is a device that connects different types of networks with each other
- 4. It is used to connect a computer to the available internet connection over the existing telephones lines.
- 6. It refers to a computer network restricted to an organization
- 7. It is program or a set of programs that disrupt the normal functioning of a computer
- 9. The process of transforming data into unreadable code
- 10. It is an security system that prevents unauthorized people from accessing your system and network
- 12. A computer network created for an individual person
- 13. It is a wireless technology used to interconnect mobiles , computer using short range wireless connection
- 14. The term is a combination of "Voice" and "Phishing"
- 18. It refers to an illegal intrusion into a computer system or network
