IT - Crossword
Across
- 3. Any action derived from intelligent threats to violate the security of the
- 5. Involves actions that supplement the precautionary measures
- 10. An act or instance of using or closely imitating the language and thoughts of another author without authorization
- 13. A common type of online fraud
- 15. A weakness, design, or implementation error
- 16. A crime in which a computer is the object of the crime
- 17. Ensuring that the information is accessible to authorized persons when required without delay.
- 18. The exclusive legal right, given to an originator
- 19. Use computer technology to access personal information,
- 20. The identification and assurance of the origin of information
- 21. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or
Down
- 1. Any action of stealing information from a users’ system.
- 2. Action taken in advance to protect the system against potential threats or
- 4. Information/data can be accessed only by those authorized
- 6. An assurance for which someone cannot deny something
- 7. Ending information out and collecting it from unsuspecting people
- 8. A defined method of breaching the security of an IT system through
- 9. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- 11. User security allows the system to set security rules to determine what is displayed to which user.
- 12. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
- 14. Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers