IMR533-Chapter 5.1-Computer Crimes
Across
- 2. The spread of _____can interfere with computers and change or erase data, which affects how data is stored.
- 4. Many parties, including authorities, make significant investments, such as sophisticated threat detection systems, encryption tools, and staff training in order to improve it.
- 7. Viruses, worms, ransomware, trojans and spyware are the examples.
- 10. Typically intended to advertise goods and services, but it can also be used to spread malware or launch phishing scams.
- 11. Any criminal activity that involves a computer or network as the primary tool or target of the offense.
- 12. An assault on a networking system that stops a server from servicing customers.
- 14. Cyber _____ occurs when someone creates or joins online groups or communities that harass, mock, or bully their target.
- 15. _____theft occurs when an attacker deceives a victim into giving up personal information and then utilises it to commit a crime.
- 16. Cyber _____is defined as the use of the internet to create, display, import, distribute, or publish pornographic or obscene content.
Down
- 1. Finding and taking advantage of flaws in computer networks or systems in order to obtain data without authorisation, or accomplish other nefarious goals.
- 3. Cyberbullying can cause self-doubt and _____ thoughts.
- 5. Computer _____ is a subset of computer crime.
- 6. Extreme types of pornography, violent movies, graphic novels, and other media that show violent or sexual behaviours in a way that is meant to shock or arouse are examples of _____ publications.
- 8. Hacking, malware distribution, denial-of-service attacks, and cyber _____ are examples of illegal activities on the Net.
- 9. Deception using emails, messages, or websites to collect personal data for malevolent reasons.
- 13. _____ is morally acceptable when it is done to strengthen security, find security flaws, and address them.