MIL SET B

123456789101112131415
Across
  1. 6. that takes place online
  2. 9. Refers to listening to, recording, monitoring or surveillance of the content of communications
  3. 13. Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
  4. 14. The access to the whole or any part of a computer system without right.
  5. 15. Refers to a set of instructions executed by the computer to achieve intended results.
Down
  1. 1. refers to the process of harvesting bank details
  2. 2. The input, alteration, or deletion of any computer data
  3. 3. the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
  4. 4. the excessive use of computers to the extent that it interferes with daily life.
  5. 5. Refers to a representation of information, knowledge, facts, concepts
  6. 7. refers to pedophiles using the Internet as a means to contact children
  7. 8. The acquisition of a domain name over the internet
  8. 10. Refers to a computer or computer network
  9. 11. The willful engagement of any lascivious exhibition of sexual organs or sexual activity
  10. 12. The unauthorized input, alteration, or deletion of computer data