1. 4. Intention to damage a person.
  2. 5. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. 6. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. 8. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. 9. Ability of a user to access information or resources in a specified location and in the correct format.
  6. 10. Illegal access to a computer system for the purpose od causing damage.
  1. 1. Malicious software designed to damage.
  2. 2. Without permission or authorization
  3. 3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. 7. It's the protection of personal information.