chapter 7

123456789101112131415
Across
  1. 4. individuals use tech to harass others
  2. 7. using a computer to commit a crime such as stealing money from credit cards
  3. 9. theft of customer records to obain personal details used to commit identity fraud
  4. 11. a malicious attack on a network
  5. 12. sending emails that appear to be from a reliable source to get personal info for th purpouse of identity theft
  6. 13. designed to spread from computer to computer around a network without needing to be attached to any document or program
  7. 15. can store itself automatically on a computer hard drive as a hidden file but can be detected when a cerntain program is opened ect
Down
  1. 1. a peice of software that is designed to record a users keystrokes
  2. 2. someone who gains unauthorised access to a computer with the intention of corrupting data stored on a hard drive
  3. 3. using the internet to damage the reputation of a person or organisation by posting slanderous messages
  4. 5. software that is downloaded onto a computer unintentionally via the internet or from emial attachemts
  5. 6. used as a means of hiding malware when dowloaded increase of data being corrupted by virus or unaotherised user
  6. 8. sending bulk junk emails such as adverts for products
  7. 10. gains entry to a computer in disguise
  8. 14. intentionally and falsely altering digital content such as pictures or documents