COMPUTER FRAUD

123456789
Across
  1. 2. A fraud in which printed output can be stolen, copied, or misused
  2. 4. A fraud that includes unauthorized system use, including the theft of computer time and services.
  3. 6. A fraud that includes altering or falsify computer input
  4. 7. A fraud by which Cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
  5. 8. A fraud that includes Illegally using, copying, browsing, searching, or harming company data constitutes data fraud. The biggest cause of data breaches is employee negligence.
  6. 9. wrongful or criminal deception intended to result in financial or personal gain
Down
  1. 1. is a basic, complete, and functional hardware and software setup with everything needed to implement computing performance.
  2. 3. is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM)
  3. 4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  4. 5. Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data