Across
- 1. an crime perpetrated using computers and networks.
- 2. a form of bullying or harassment using computer -based communication.
- 3. piracy, the unauthorized reproduction, distribution or use of software products.
- 7. A ___________ monitors a network, blocking dangerous content such as viruses.
- 8. Security, Activities related to identifying , assessing and managing vulnerabilities, threats and attacks on a computer system.
- 10. A ____________________ is a piece of data sent from a website and stored on the user's computer by the user's web browser which the user is browsing.
- 11. of Service Attack, A cyber attack where the intent is to prevent a service being delivered by the targeted system.
- 12. Actual action that causes harm or damage.
- 14. the attempt to obtain sensitive information such as usernames, passwords, and credit card details by sending emails pretending to be from a legitimate organization.
- 17. and Waterproof Storage,
- 19. any data or resources that can be accessed via a network or the space where the Internet operates.
Down
- 1. An action taken to counteract a threat.
- 4. , Exposure to the possibility of being attacked or harmed.
- 5. a statement of an intention to inflict harm or damage.
- 6. the right of a persons to choose freely under what circumstances and to what extent they will reveal information about themselves.
- 9. theft, The deliberate use of someone else's identity, usually to gain a financial advantage.
- 13. The legal rights that gives the creator of an original work exclusive rights over its use and distribution.
- 15. Measures,
- 16. Misuse, any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- 18. Theft, the unauthorized copying or removal of data from the legitimate owner's computer system.
