Across
- 4. Safeguards protecting computer systems from attacks
- 5. Self replicating program that spreads through networks
- 8. Illegal activity conducted using the Internet or computer systems
- 10. Fake QR codes used to trick users into scams
- 12. Providing false or incomplete information
- 15. Situation where personal interest conflicts with professional duty
- 18. Person who gains unauthorized access to systems
- 22. Fraudulent emails attempting to steal personal information
- 23. Malicious program disguised as legitimate software
- 25. Small text files stored by websites on a user's computer
- 26. Obtaining goods or services through trickery
- 29. Hidden method allowing bypass of security controls
- 30. Network of infected computers controlled by attackers
- 33. Failure to fulfill agreement terms
- 36. Attack that disrupts access to an Internet service
- 38. Software that displays unwanted advertisements
- 39. Manipulating people to gain confidential information
- 40. Private combination of words used for authentication
- 41. Attacker who uses tools created by others without deep knowledge
- 44. Program that infects files and alters system operation
- 45. Digital record of a user's online activities
Down
- 1. Individual using networks to cause political damage
- 2. Stealing confidential or personal data
- 3. Guidelines defining acceptable and ethical behaviour
- 6. Using a computer system without permission
- 7. Malware that blocks access until payment is made
- 8. Hacker who intentionally destroys or steals data
- 9. Degree to which information reflects true values
- 11. Protection of devices networks and data from threats
- 13. Illegal copying or stealing of software
- 14. Original creations such as inventions writings or logos
- 16. Attack where communication is secretly intercepted
- 17. Event that could damage computer hardware software or data
- 19. Technique where fake websites mimic real ones
- 20. Program that hides deep in a system to allow remote control
- 21. Valuable confidential business information
- 24. Software that secretly collects user information
- 27. Reporting illegal or unethical actions within an organization
- 28. Unauthorized duplication or distribution of software
- 31. Using computer resources for illegal or unapproved activities
- 32. Right to control personal data collection and use
- 34. Stealing physical computer equipment
- 35. Criminal demanding payment to stop attacks
- 37. Attack using many compromised systems to overwhelm a target
- 42. Moral principles governing technology use
- 43. Policy describing acceptable use of computer systems
