IT - Crossword
Across
- 1. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that
- 3. film, or record literary, artistic, or musical material, and to authorize
- 6. The identification and assurance of the origin of information
- 8. Unauthorized access of or interference with computer systems, servers, or
- 13. author without authorization
- 14. An act or instance of using or closely imitating the language and thoughts of
- 15. A weakness, design, or implementation error that can lead to an
- 16. event that compromises the security of the system.
- 18. in order to induce individuals to reveal personal information, such as
- 19. Action taken in advance to protect the system against potential threats or
- 20. only by those authorized
- 22. Ensuring that the information is accessible to authorized persons when required without delay.
- 23. Any action derived from intelligent threats to violate the security of the
- 25. fraudulent practice of sending emails purporting to be from reputable
- 27. your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
- 28. to do the same
- 29. phishing, spamming and child pornography) is used as a tool to commit
- 30. may use computer technology to access personal information,
- 32. of sexual organs or sexual activity with the aid of a computer system for favor or
Down
- 2. A defined method of breaching the security of an IT system through
- 4. information and communication systems
- 5. and credit card numbers
- 7. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
- 9. Ensuring that the information/data can be
- 10. Involves actions that supplement the precautionary measures
- 11. A common type of online fraud
- 12. An assurance for which someone cannot deny something
- 17. trade secrets or use the internet for exploitative or malicious purposes.
- 21. Any action of stealing information from a users’ system.
- 23. offense
- 24. a crime in which a computer is the object of the crime
- 26. User security allows the system to set security rules to determine what is displayed to which user.
- 31. The exclusive legal right, given to an originator or an assignee to print, publish,