Final activity #1

12345678910111213141516171819
Across
  1. 1. is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
  2. 7. An action or event that has the potential to compromise and/or violate
  3. 9. The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  4. 10. is a state of well-being of information and infrastructures.
  5. 12. An individual who breaks into computer systems to steal, change, or destroy information.
  6. 13. may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
  7. 15. ensuring that the information/data can be accessed only by those authorized
  8. 17. ensuring that the information is accessible to authorized persons when required without delay
  9. 18. It is the Characteristics of the culture of computers, information, technology and virtual reality
  10. 19. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
  1. 2. the identification and assurance of the origin of information.
  2. 3. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  3. 4. is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
  4. 5. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
  5. 6. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  6. 8. Any action derived from intelligent threats to violate the security of the
  7. 9. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  8. 11. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
  9. 14. ensuring that the information is accurate, complete, reliable, and is in its original form.
  10. 16. A defined method of breaching the security of an IT system through vulnerability.