Across
- 2. A fraud in which printed output can be stolen, copied, or misused
- 4. A fraud that includes unauthorized system use, including the theft of computer time and services.
- 6. A fraud that includes altering or falsify computer input
- 7. A fraud by which Cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
- 8. A fraud that includes Illegally using, copying, browsing, searching, or harming company data constitutes data fraud. The biggest cause of data breaches is employee negligence.
- 9. wrongful or criminal deception intended to result in financial or personal gain
Down
- 1. is a basic, complete, and functional hardware and software setup with everything needed to implement computing performance.
- 3. is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM)
- 4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 5. Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data