Final activity #1

123456789101112131415161718192021
Across
  1. 4. is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. 5. ensuring that the information/data can be accessed only by those authorized
  3. 7. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
  4. 9. The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  5. 10. ensuring that the information is accurate, complete, reliable, and is in its original form.
  6. 12. is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
  7. 14. An individual who breaks into computer systems to steal, change, or destroy information.
  8. 15. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  9. 16. Any action derived from intelligent threats to violate the security of the
  10. 17. An action or event that has the potential to compromise and/or violate
  11. 18. is a state of well-being of information and infrastructures.
  12. 20. may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
  13. 21. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
  1. 1. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  2. 2. the identification and assurance of the origin of information.
  3. 3. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  4. 6. A defined method of breaching the security of an IT system through vulnerability.
  5. 8. ensuring that the information is accessible to authorized persons when required without delay
  6. 11. It is the Characteristics of the culture of computers, information, technology and virtual reality
  7. 13. is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
  8. 19. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.