LAW>ICT
Across
- 5. Threat through natural events
- 6. Process by where a criminal hide the origin of the proceeded of their crime by transforming the money through different bank accounts
- 8. Normally criminal activity
Down
- 1. Identified and reported to the software designer
- 2. misuse act 2000 Unauthorised access to computer materials, modification of materials
- 3. Places piece of malware on a group of computers
- 4. Data is the equivalent to a virtual you
- 7. categories Negligible, Minor, significant and critical are what?
- 9. Deleting data