Computer Crime and Cyber Security

12345678910
Across
  1. 2. Information that can be used to identify you
  2. 4. An example of a malicious software that can disrupt a computer system
  3. 6. The number of degrees your elbows should be at when working at a desk.
  4. 8. A type of email scam to try and gather personal information for illegitimate reasons
  5. 9. Malicious software
  6. 10. Which Act makes accessing a device without permission, illegal?
Down
  1. 1. An Act which means data collectors MUST keep the data secure.
  2. 3. The number of CM a monitor should be from your face.
  3. 5. A type of malware that prevents access to data until a SUM of money has been paid.
  4. 7. Special category data that must be kept with extra security