Foundation of Security and Cybercrime

12345678910111213141516171819
Across
  1. 3. anticipation of security incidents and planning for measures to be taken.
  2. 5. an individualwho breaks into computer systems to steal, change, or destroy information
  3. 6. unauthorized access of or interference with computer systems, servers, or other information and communication systems
  4. 8. the use of electronic communication to bully a person
  5. 10. an act or instance of using/closely imitating the language and thoughts of another author without authorization
  6. 14. personnel, hardware, programs, networks, and data
  7. 17. malicious program disguised as or embedded within legitimate software
  8. 18. state of wel-being of information or infrastructure
  9. 19. action taken in advance to protect the system against potential threats or dangers.
Down
  1. 1. common type of online fraud
  2. 2. applications on the computers and operating systems
  3. 4. fraudulent practice of sending emails purporting to be someone reputable
  4. 7. ensuring that the information is accessible to authorized persons when required without delay
  5. 9. includes creating backup copies, malware management, and ensuring sufficient space and memory.
  6. 11. malicious software
  7. 12. wireless fidelity
  8. 13. an assurance for which someone cannot deny something
  9. 15. an action or event with potential to compromise and/or violate security.
  10. 16. exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
  11. 18. mass distribution of unsolicited messages, advertisements, and/or pornogaphy