ISCC Chapter 7

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 4. Safeguards protecting computer systems from attacks
  2. 5. Self replicating program that spreads through networks
  3. 8. Illegal activity conducted using the Internet or computer systems
  4. 10. Fake QR codes used to trick users into scams
  5. 12. Providing false or incomplete information
  6. 15. Situation where personal interest conflicts with professional duty
  7. 18. Person who gains unauthorized access to systems
  8. 22. Fraudulent emails attempting to steal personal information
  9. 23. Malicious program disguised as legitimate software
  10. 25. Small text files stored by websites on a user's computer
  11. 26. Obtaining goods or services through trickery
  12. 29. Hidden method allowing bypass of security controls
  13. 30. Network of infected computers controlled by attackers
  14. 33. Failure to fulfill agreement terms
  15. 36. Attack that disrupts access to an Internet service
  16. 38. Software that displays unwanted advertisements
  17. 39. Manipulating people to gain confidential information
  18. 40. Private combination of words used for authentication
  19. 41. Attacker who uses tools created by others without deep knowledge
  20. 44. Program that infects files and alters system operation
  21. 45. Digital record of a user's online activities
Down
  1. 1. Individual using networks to cause political damage
  2. 2. Stealing confidential or personal data
  3. 3. Guidelines defining acceptable and ethical behaviour
  4. 6. Using a computer system without permission
  5. 7. Malware that blocks access until payment is made
  6. 8. Hacker who intentionally destroys or steals data
  7. 9. Degree to which information reflects true values
  8. 11. Protection of devices networks and data from threats
  9. 13. Illegal copying or stealing of software
  10. 14. Original creations such as inventions writings or logos
  11. 16. Attack where communication is secretly intercepted
  12. 17. Event that could damage computer hardware software or data
  13. 19. Technique where fake websites mimic real ones
  14. 20. Program that hides deep in a system to allow remote control
  15. 21. Valuable confidential business information
  16. 24. Software that secretly collects user information
  17. 27. Reporting illegal or unethical actions within an organization
  18. 28. Unauthorized duplication or distribution of software
  19. 31. Using computer resources for illegal or unapproved activities
  20. 32. Right to control personal data collection and use
  21. 34. Stealing physical computer equipment
  22. 35. Criminal demanding payment to stop attacks
  23. 37. Attack using many compromised systems to overwhelm a target
  24. 42. Moral principles governing technology use
  25. 43. Policy describing acceptable use of computer systems