chapter 7
Across
- 4. individuals use tech to harass others
- 7. using a computer to commit a crime such as stealing money from credit cards
- 9. theft of customer records to obain personal details used to commit identity fraud
- 11. a malicious attack on a network
- 12. sending emails that appear to be from a reliable source to get personal info for th purpouse of identity theft
- 13. designed to spread from computer to computer around a network without needing to be attached to any document or program
- 15. can store itself automatically on a computer hard drive as a hidden file but can be detected when a cerntain program is opened ect
Down
- 1. a peice of software that is designed to record a users keystrokes
- 2. someone who gains unauthorised access to a computer with the intention of corrupting data stored on a hard drive
- 3. using the internet to damage the reputation of a person or organisation by posting slanderous messages
- 5. software that is downloaded onto a computer unintentionally via the internet or from emial attachemts
- 6. used as a means of hiding malware when dowloaded increase of data being corrupted by virus or unaotherised user
- 8. sending bulk junk emails such as adverts for products
- 10. gains entry to a computer in disguise
- 14. intentionally and falsely altering digital content such as pictures or documents