Foundation of Security and Cybercrime
Across
- 3. anticipation of security incidents and planning for measures to be taken.
- 5. an individualwho breaks into computer systems to steal, change, or destroy information
- 6. unauthorized access of or interference with computer systems, servers, or other information and communication systems
- 8. the use of electronic communication to bully a person
- 10. an act or instance of using/closely imitating the language and thoughts of another author without authorization
- 14. personnel, hardware, programs, networks, and data
- 17. malicious program disguised as or embedded within legitimate software
- 18. state of wel-being of information or infrastructure
- 19. action taken in advance to protect the system against potential threats or dangers.
Down
- 1. common type of online fraud
- 2. applications on the computers and operating systems
- 4. fraudulent practice of sending emails purporting to be someone reputable
- 7. ensuring that the information is accessible to authorized persons when required without delay
- 9. includes creating backup copies, malware management, and ensuring sufficient space and memory.
- 11. malicious software
- 12. wireless fidelity
- 13. an assurance for which someone cannot deny something
- 15. an action or event with potential to compromise and/or violate security.
- 16. exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
- 18. mass distribution of unsolicited messages, advertisements, and/or pornogaphy