Security & Cybercrimes

12345678910111213141516171819
Across
  1. 2. an action that violates the security of the system
  2. 5. a malware that demands payment to gain access to your computer or files again
  3. 7. a weakness that can compromise the security of the system
  4. 8. any sexual activity done with the aid of computer systems
  5. 14. allows the user to use an application or perform an operation
  6. 15. a state of well-being of information and infrastructures
  7. 17. using or copying ideas of others without their consent
  8. 18. it has to be protected and secured
  9. 19. work on its own without attaching itself to files or programs
Down
  1. 1. used by third parties to infiltrate your computer
  2. 3. a crime involving computers
  3. 4. an attempt to obtain sensitive information
  4. 6. taken in advance to protect the system against potential threats
  5. 7. degrades system performance and poses a security threat
  6. 9. malicious software
  7. 10. must be strong to protect accounts
  8. 11. ensuring that the information is accurate, complete, reliable, and is in its original form
  9. 12. another term for phishing
  10. 13. exclusive legal right
  11. 16. an individual who breaks into computer systems to steal, change, or destroy information