Across
- 3. Act of creating fraudulent digital signatures under the IT Act.
- 7. Technique for securing data as per IT Act guidelines.
- 10. Area where the IT Act has the power to enforce laws.
- 12. Illegal content covered under Section 67.
- 13. Term for records, documents, or data as defined in the IT Act.
- 14. Legal action taken for offenses under the IT Act.
- 18. Crime involving computers or networks under the IT Act.
- 19. Authority to decide penalties for cyber offenses.
- 20. Access without permission, covered under multiple sections.
Down
- 1. Protection of information infrastructure under Section 70.
- 2. Authority responsible for issuing digital signatures.
- 4. Cybercrime involving fraudulent emails for personal data theft.
- 5. Entity facilitating online services regulated under the Act.
- 6. Changes or updates made to the IT Act, such as in 2008.
- 8. Manipulation of computer source code, Section 65.
- 9. Violation or illegal activity defined under the IT Act.
- 11. Duty to protect sensitive data, highlighted in Section 72.
- 15. Unauthorized access to computer systems as per Section 66.
- 16. Type of signature recognized by the IT Act for authentication.
- 17. Legal consequences for violating the IT Act.