Across
- 1. consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer.
- 5. is the illegal copying of information from the magnetic strip of a credit or ATM card
- 6. illegally using, copying browsing, searching, or harming company data. The biggest cause of data breaches is employee negligence.
- 7. is any fraud that requires computer technology to perpetrate card
- 9. is one of the unique challenges that computer system encounter.
- 10. the simplest and most common way to commit a computer fraud is to alter or falsify computer input.
Down
- 2. includes unauthorized system use, including the theft of computer time and services.
- 3. a fraud where a very small amount of money is removed from each transaction and put into a suspense account
- 4. includes tampering with company software, copying software illegally, using software in an unauthorized manner, developing software to carry out unauthorized activity.
- 8. it comes from the analogy that internet scammers are using email lures to fish for passwords and financial data from the sea of Internet user.