Data Security and Information Misuse

123456789101112131415
Across
  1. 3. copying music CDs for sale
  2. 5. A type of card normally involved in frauds
  3. 7. a type of data backing up procedure
  4. 10. threatening someone onliine repeatedly
  5. 13. a type of natural hazard
  6. 14. the crambling of words
  7. 15. grants access through retina scanner
Down
  1. 1. a program used to gain access to data unlawfully
  2. 2. a type of computer virus
  3. 3. an individual contacting and pretending to be another for exploitation
  4. 4. used to protect a network's resources from intrusion via the internet
  5. 6. the monitoring of another person's computer
  6. 8. personnel that breaks into computer systems
  7. 9. physical parts of a computer
  8. 11. ____________ theft is when someone is pretending to be another
  9. 12. a type of code used to access cell phones