Security & Cybercrimes
Across
- 2. an action that violates the security of the system
- 5. a malware that demands payment to gain access to your computer or files again
- 7. a weakness that can compromise the security of the system
- 8. any sexual activity done with the aid of computer systems
- 14. allows the user to use an application or perform an operation
- 15. a state of well-being of information and infrastructures
- 17. using or copying ideas of others without their consent
- 18. it has to be protected and secured
- 19. work on its own without attaching itself to files or programs
Down
- 1. used by third parties to infiltrate your computer
- 3. a crime involving computers
- 4. an attempt to obtain sensitive information
- 6. taken in advance to protect the system against potential threats
- 7. degrades system performance and poses a security threat
- 9. malicious software
- 10. must be strong to protect accounts
- 11. ensuring that the information is accurate, complete, reliable, and is in its original form
- 12. another term for phishing
- 13. exclusive legal right
- 16. an individual who breaks into computer systems to steal, change, or destroy information