Unit III Crossword II

1234567891011121314151617181920
Across
  1. 3. Act of creating fraudulent digital signatures under the IT Act.
  2. 7. Technique for securing data as per IT Act guidelines.
  3. 10. Area where the IT Act has the power to enforce laws.
  4. 12. Illegal content covered under Section 67.
  5. 13. Term for records, documents, or data as defined in the IT Act.
  6. 14. Legal action taken for offenses under the IT Act.
  7. 18. Crime involving computers or networks under the IT Act.
  8. 19. Authority to decide penalties for cyber offenses.
  9. 20. Access without permission, covered under multiple sections.
Down
  1. 1. Protection of information infrastructure under Section 70.
  2. 2. Authority responsible for issuing digital signatures.
  3. 4. Cybercrime involving fraudulent emails for personal data theft.
  4. 5. Entity facilitating online services regulated under the Act.
  5. 6. Changes or updates made to the IT Act, such as in 2008.
  6. 8. Manipulation of computer source code, Section 65.
  7. 9. Violation or illegal activity defined under the IT Act.
  8. 11. Duty to protect sensitive data, highlighted in Section 72.
  9. 15. Unauthorized access to computer systems as per Section 66.
  10. 16. Type of signature recognized by the IT Act for authentication.
  11. 17. Legal consequences for violating the IT Act.