mod 6 and 7

1234567891011121314151617181920
Across
  1. 3. they exploit technology for manipulation
  2. 7. actions that supplement the precautionary measures
  3. 11. tricks users into revealing sensitive information through fake websites or messages
  4. 13. accurate, complete, reliable, and in its original form
  5. 14. redirects users to fraudulent websites to steal information.
  6. 15. security rules to determine what is displayed to which user
  7. 18. online bullying and abuse
  8. 19. refers to data from physical threats
  9. 20. computer-based offences
Down
  1. 1. software intentionally designed to harm, exploit, or disrupt computers, networks, or devices.
  2. 2. action taken in advance to protect the system
  3. 4. stealing of information from a user's system
  4. 5. unauthorized system access
  5. 6. a potential harm
  6. 8. assurance of the origin of information
  7. 9. unauthorized content reproduction
  8. 10. legal content ownership protection
  9. 12. a hacker or intruder
  10. 16. mass distribution of unsolicited messages, advertising or pornography
  11. 17. a weakness or implementation error