Across
- 2. to ask questions, research questions and to know about security measures
- 4. using someone else identity without being authorized and using it for criminal activities
- 8. obtain sensitive information as in text messages
- 9. creating a fake website to get into personal information by creating a fake url into a domain Name servers
- 10. use security tools and monitor networks to avoid attacks
- 11. open access was first implemented to share study materials.
- 12. obtain sensitive information as in e-mail
- 13. is an extremely sophisticated worm
- 14. monitor and block communication from unreliable websites.
- 15. prohibited use of a computer unless authorized
- 16. obtain sensitive information as in voice phishing
- 17. techniques on how to steal personal and financial data
Down
- 1. prioritize security in their advancements
- 2. involves hacking for political purposes
- 3. publishers must prevent access towards other nations when it is prohibited
- 5. The cost of defending an attack is included in the definition of loss under the Act
- 6. traits that are specific to an individual biologically
- 7. using someone else identity without being authorized and using it for criminal activities
- 9. Programming's excitement
- 12. is the expansion of online and mobile technologies
