LAW>ICT

123456789
Across
  1. 5. Threat through natural events
  2. 6. Process by where a criminal hide the origin of the proceeded of their crime by transforming the money through different bank accounts
  3. 8. Normally criminal activity
Down
  1. 1. Identified and reported to the software designer
  2. 2. misuse act 2000 Unauthorised access to computer materials, modification of materials
  3. 3. Places piece of malware on a group of computers
  4. 4. Data is the equivalent to a virtual you
  5. 7. categories Negligible, Minor, significant and critical are what?
  6. 9. Deleting data