chapter 7

12345678910111213141516
Across
  1. 5. using a computer to commit a crime
  2. 12. intentionally and falsely altering digital content
  3. 14. provides hackers with entry point into a computer without the need to enter a password
  4. 16. a malicious attack on a network
Down
  1. 1. using tech to harass others
  2. 2. designed to spread from computer to computer around a network without the need to be attached to any doc or program
  3. 3. someone who gains unauthorised access to a computer with the intention of corrupting data
  4. 4. a computer program designed to damage or make a computer system unreliable
  5. 6. software designed to record a users kaystrokes
  6. 7. sending bulk junk emails such as adverts for products
  7. 8. a hiding malware and when downloaded increase risk of organisation data being corrupted or stolen
  8. 9. sending emails that appear to be from a reliable source
  9. 10. software that is downloaded onto a computer unintentionally via internet or email attachments
  10. 11. using the internet with intentions to damage the reputation of a person or organisation
  11. 13. theft of customer records to obtain personal details used to commit identity fraud
  12. 15. horse gains entry to computer in disguise and deletes data files or changes desktop layout