Across
- 5. using a computer to commit a crime
- 12. intentionally and falsely altering digital content
- 14. provides hackers with entry point into a computer without the need to enter a password
- 16. a malicious attack on a network
Down
- 1. using tech to harass others
- 2. designed to spread from computer to computer around a network without the need to be attached to any doc or program
- 3. someone who gains unauthorised access to a computer with the intention of corrupting data
- 4. a computer program designed to damage or make a computer system unreliable
- 6. software designed to record a users kaystrokes
- 7. sending bulk junk emails such as adverts for products
- 8. a hiding malware and when downloaded increase risk of organisation data being corrupted or stolen
- 9. sending emails that appear to be from a reliable source
- 10. software that is downloaded onto a computer unintentionally via internet or email attachments
- 11. using the internet with intentions to damage the reputation of a person or organisation
- 13. theft of customer records to obtain personal details used to commit identity fraud
- 15. horse gains entry to computer in disguise and deletes data files or changes desktop layout
