Cyber Security

12345678910111213141516171819
Across
  1. 1. an crime perpetrated using computers and networks.
  2. 2. a form of bullying or harassment using computer -based communication.
  3. 3. piracy, the unauthorized reproduction, distribution or use of software products.
  4. 7. A ___________ monitors a network, blocking dangerous content such as viruses.
  5. 8. Security, Activities related to identifying , assessing and managing vulnerabilities, threats and attacks on a computer system.
  6. 10. A ____________________ is a piece of data sent from a website and stored on the user's computer by the user's web browser which the user is browsing.
  7. 11. of Service Attack, A cyber attack where the intent is to prevent a service being delivered by the targeted system.
  8. 12. Actual action that causes harm or damage.
  9. 14. the attempt to obtain sensitive information such as usernames, passwords, and credit card details by sending emails pretending to be from a legitimate organization.
  10. 17. and Waterproof Storage,
  11. 19. any data or resources that can be accessed via a network or the space where the Internet operates.
Down
  1. 1. An action taken to counteract a threat.
  2. 4. , Exposure to the possibility of being attacked or harmed.
  3. 5. a statement of an intention to inflict harm or damage.
  4. 6. the right of a persons to choose freely under what circumstances and to what extent they will reveal information about themselves.
  5. 9. theft, The deliberate use of someone else's identity, usually to gain a financial advantage.
  6. 13. The legal rights that gives the creator of an original work exclusive rights over its use and distribution.
  7. 15. Measures,
  8. 16. Misuse, any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  9. 18. Theft, the unauthorized copying or removal of data from the legitimate owner's computer system.