In the World of IT: Crime and Security

12345678910111213141516171819
Across
  1. 3. exclusive legal right.
  2. 7. Ensures that information is accessible to authorize persons when required without delay.
  3. 9. Action derived from intelligent threats to violate the security of the system
  4. 10. Security hole.
  5. 12. Ensures that that the computer users or those who access information are who they claim to be.
  6. 13. Both sending and collecting of information from unsuspecting people.
  7. 14. An action that has the potential to compromise and/or violate security.
  8. 15. Work on its own without attaching itself to file or programs.
  9. 18. Pointing you to a malicious and illegitimate website by redirecting the legitimate URL.
  10. 19. This involves actions that supplement the precautionary measures.
Down
  1. 1. One of the layers of security that protects personnel, hardware, programs, networks, and data from physical threat.
  2. 2. Term used for actions taken by someone to gain unauthorizes access to a computer.
  3. 4. A person who breaks into computer systems.
  4. 5. Sending emails purporting to be from reputable companies to gain personal information.
  5. 6. Characteristics of the culture of computers, information, technology, and virtual reality.
  6. 8. Often sent as email attachment or download with the intent of infecting the computer.
  7. 9. Excessive gaming behavior.
  8. 11. Action take in advance to protect the system against threats.
  9. 16. Infects your computer (viruses, worms, spyware.
  10. 17. One of the layers of security that allows the system to set security rules to determine what is displayed to which user.