MIL SET B
Across
- 6. that takes place online
- 9. Refers to listening to, recording, monitoring or surveillance of the content of communications
- 13. Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- 14. The access to the whole or any part of a computer system without right.
- 15. Refers to a set of instructions executed by the computer to achieve intended results.
Down
- 1. refers to the process of harvesting bank details
- 2. The input, alteration, or deletion of any computer data
- 3. the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
- 4. the excessive use of computers to the extent that it interferes with daily life.
- 5. Refers to a representation of information, knowledge, facts, concepts
- 7. refers to pedophiles using the Internet as a means to contact children
- 8. The acquisition of a domain name over the internet
- 10. Refers to a computer or computer network
- 11. The willful engagement of any lascivious exhibition of sexual organs or sexual activity
- 12. The unauthorized input, alteration, or deletion of computer data