Across
- 3. they exploit technology for manipulation
- 7. actions that supplement the precautionary measures
- 11. tricks users into revealing sensitive information through fake websites or messages
- 13. accurate, complete, reliable, and in its original form
- 14. redirects users to fraudulent websites to steal information.
- 15. security rules to determine what is displayed to which user
- 18. online bullying and abuse
- 19. refers to data from physical threats
- 20. computer-based offences
Down
- 1. software intentionally designed to harm, exploit, or disrupt computers, networks, or devices.
- 2. action taken in advance to protect the system
- 4. stealing of information from a user's system
- 5. unauthorized system access
- 6. a potential harm
- 8. assurance of the origin of information
- 9. unauthorized content reproduction
- 10. legal content ownership protection
- 12. a hacker or intruder
- 16. mass distribution of unsolicited messages, advertising or pornography
- 17. a weakness or implementation error
