LEGAL

12345678
Across
  1. 1. refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
  2. 6. Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
  3. 7. These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
  4. 8. is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
  1. 2. refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
  2. 3. is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
  3. 4. theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
  4. 5. refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization