Across
- 2. when someone operates a computer disrupting part of the national electronic infrastructure.
- 3. The use of IT to harm or harass other people in a deliberate, repeated, and hostile manner
- 5. Developing a program intended to damage or disable computers and their systems
- 6. disrupting, damaging, or destroying a website or computer network
- 10. adopting the identity of another computer user, or creating a false identity on a computer website in order to commit fraud.
- 12. Literary theft
- 13. Gaining unauthorized access to data in a computer or an entire network
- 15. Any criminal activity associated with a computer
Down
- 1. The control or suppression of what can be accessed, published, or viewed on the Internet.
- 2. using a computer to steal computer data stored in a digital format.
- 4. warfare, transmitting computer viruses to people to destroy their computer system or files.
- 7. fraudulent practice of sending emails that appear to be from reputable companies to induce individuals to reveal personal information, like passwords and credit card numbers.
- 8. area of law which concerns computer and computer-related crimes.
- 9. using a computer to steal computer data stored in a digital format.
- 10. tort, The invasion, theft, falsification, misuse, or deletion of data stored in a computer to commit a tort
- 11. Use of a variety of media, including photos, film, video, and video games depicting the engagement in acts of a sexual nature
- 14. theft, using a computer to steal financial, employment, educational, medical, and personal data.