IT - Crossword

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that
  2. 3. film, or record literary, artistic, or musical material, and to authorize
  3. 6. The identification and assurance of the origin of information
  4. 8. Unauthorized access of or interference with computer systems, servers, or
  5. 13. author without authorization
  6. 14. An act or instance of using or closely imitating the language and thoughts of
  7. 15. A weakness, design, or implementation error that can lead to an
  8. 16. event that compromises the security of the system.
  9. 18. in order to induce individuals to reveal personal information, such as
  10. 19. Action taken in advance to protect the system against potential threats or
  11. 20. only by those authorized
  12. 22. Ensuring that the information is accessible to authorized persons when required without delay.
  13. 23. Any action derived from intelligent threats to violate the security of the
  14. 25. fraudulent practice of sending emails purporting to be from reputable
  15. 27. your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  16. 28. to do the same
  17. 29. phishing, spamming and child pornography) is used as a tool to commit
  18. 30. may use computer technology to access personal information,
  19. 32. of sexual organs or sexual activity with the aid of a computer system for favor or
Down
  1. 2. A defined method of breaching the security of an IT system through
  2. 4. information and communication systems
  3. 5. and credit card numbers
  4. 7. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
  5. 9. Ensuring that the information/data can be
  6. 10. Involves actions that supplement the precautionary measures
  7. 11. A common type of online fraud
  8. 12. An assurance for which someone cannot deny something
  9. 17. trade secrets or use the internet for exploitative or malicious purposes.
  10. 21. Any action of stealing information from a users’ system.
  11. 23. offense
  12. 24. a crime in which a computer is the object of the crime
  13. 26. User security allows the system to set security rules to determine what is displayed to which user.
  14. 31. The exclusive legal right, given to an originator or an assignee to print, publish,