Auditing in CIS Environment

12345678910
Across
  1. 1. consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer.
  2. 5. is the illegal copying of information from the magnetic strip of a credit or ATM card
  3. 6. illegally using, copying browsing, searching, or harming company data. The biggest cause of data breaches is employee negligence.
  4. 7. is any fraud that requires computer technology to perpetrate card
  5. 9. is one of the unique challenges that computer system encounter.
  6. 10. the simplest and most common way to commit a computer fraud is to alter or falsify computer input.
Down
  1. 2. includes unauthorized system use, including the theft of computer time and services.
  2. 3. a fraud where a very small amount of money is removed from each transaction and put into a suspense account
  3. 4. includes tampering with company software, copying software illegally, using software in an unauthorized manner, developing software to carry out unauthorized activity.
  4. 8. it comes from the analogy that internet scammers are using email lures to fish for passwords and financial data from the sea of Internet user.