IMR533-Chapter 5.1-Computer Crimes

12345678910111213141516
Across
  1. 2. The spread of _____can interfere with computers and change or erase data, which affects how data is stored.
  2. 4. Many parties, including authorities, make significant investments, such as sophisticated threat detection systems, encryption tools, and staff training in order to improve it.
  3. 7. Viruses, worms, ransomware, trojans and spyware are the examples.
  4. 10. Typically intended to advertise goods and services, but it can also be used to spread malware or launch phishing scams.
  5. 11. Any criminal activity that involves a computer or network as the primary tool or target of the offense.
  6. 12. An assault on a networking system that stops a server from servicing customers.
  7. 14. Cyber _____ occurs when someone creates or joins online groups or communities that harass, mock, or bully their target.
  8. 15. _____theft occurs when an attacker deceives a victim into giving up personal information and then utilises it to commit a crime.
  9. 16. Cyber _____is defined as the use of the internet to create, display, import, distribute, or publish pornographic or obscene content.
Down
  1. 1. Finding and taking advantage of flaws in computer networks or systems in order to obtain data without authorisation, or accomplish other nefarious goals.
  2. 3. Cyberbullying can cause self-doubt and _____ thoughts.
  3. 5. Computer _____ is a subset of computer crime.
  4. 6. Extreme types of pornography, violent movies, graphic novels, and other media that show violent or sexual behaviours in a way that is meant to shock or arouse are examples of _____ publications.
  5. 8. Hacking, malware distribution, denial-of-service attacks, and cyber _____ are examples of illegal activities on the Net.
  6. 9. Deception using emails, messages, or websites to collect personal data for malevolent reasons.
  7. 13. _____ is morally acceptable when it is done to strengthen security, find security flaws, and address them.