Across
- 3. exclusive legal right.
- 7. Ensures that information is accessible to authorize persons when required without delay.
- 9. Action derived from intelligent threats to violate the security of the system
- 10. Security hole.
- 12. Ensures that that the computer users or those who access information are who they claim to be.
- 13. Both sending and collecting of information from unsuspecting people.
- 14. An action that has the potential to compromise and/or violate security.
- 15. Work on its own without attaching itself to file or programs.
- 18. Pointing you to a malicious and illegitimate website by redirecting the legitimate URL.
- 19. This involves actions that supplement the precautionary measures.
Down
- 1. One of the layers of security that protects personnel, hardware, programs, networks, and data from physical threat.
- 2. Term used for actions taken by someone to gain unauthorizes access to a computer.
- 4. A person who breaks into computer systems.
- 5. Sending emails purporting to be from reputable companies to gain personal information.
- 6. Characteristics of the culture of computers, information, technology, and virtual reality.
- 8. Often sent as email attachment or download with the intent of infecting the computer.
- 9. Excessive gaming behavior.
- 11. Action take in advance to protect the system against threats.
- 16. Infects your computer (viruses, worms, spyware.
- 17. One of the layers of security that allows the system to set security rules to determine what is displayed to which user.
