Across
- 4. Intention to damage a person
- 5. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 6. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- 8. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- 9. Ability of a user to access information or resources in a specified location and in the correct format.
- 10. Illegal access to a computer system for the purpose od causing damage.
Down
- 1. Malicious software designed to damage.
- 2. Without permission or authorization
- 3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- 7. It's the protection of personal information.