Foundation of Security and Cybercrimes

123456789101112131415161718192021222324252627
Across
  1. 1. ensuring authorized personnel only
  2. 4. accessible without delay
  3. 8. steals, change, or destroy information
  4. 9. unauthorized collection of information
  5. 13. mass distribution of unsolicited messages
  6. 14. unauthorized access to electronic data
  7. 15. supplements the precautionary measures
  8. 19. exclusive legal right to utilize artistic or musical material
  9. 21. use of electronic communication to bully
  10. 22. illegal threats
  11. 24. restricts access to your computer to demand payment
  12. 25. ensuring accuracy
  13. 26. works without attaching to files
  14. 27. allows logged in users use an application
Down
  1. 2. method of breaching
  2. 3. electronic lascivious exhibition of sexual activity
  3. 5. imitating language or thought without authorization
  4. 6. fraudulent sending of emails
  5. 7. weakness
  6. 10. assurance of the origin of information
  7. 11. state of well-being
  8. 12. violate security
  9. 16. infects your computer
  10. 17. action to protect the system
  11. 18. anticipating threats
  12. 20. common online fraud
  13. 23. Someone cannot deny something