Computer Crime and Cyber Security
Across
- 2. Information that can be used to identify you
- 4. An example of a malicious software that can disrupt a computer system
- 6. The number of degrees your elbows should be at when working at a desk.
- 8. A type of email scam to try and gather personal information for illegitimate reasons
- 9. Malicious software
- 10. Which Act makes accessing a device without permission, illegal?
Down
- 1. An Act which means data collectors MUST keep the data secure.
- 3. The number of CM a monitor should be from your face.
- 5. A type of malware that prevents access to data until a SUM of money has been paid.
- 7. Special category data that must be kept with extra security