Across
- 5. The malicious practice of manipulating a website user's activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.
- 6. Predator Adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
- 8. Use a computer to gain unauthorized access to data in a system.
- 9. Ware A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 10. The loss of, unauthorized access to, or disclosure of, personal information.
- 12. A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 14. The correct or acceptable way of communicating on the Internet.
- 15. Imitate fraudulently.
Down
- 1. privacy The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
- 2. Creating Malware Computer programs designed to infiltrate and damage computers without the users consent.
- 3. Online piracy and includes the unauthorized online distribution of electronic copies of copyrighted material such as software, etc.
- 4. attacks The perpetrator seeks to make a machine or network resource unavailable.
- 7. A situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
- 11. The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
- 13. The illegal copying, distribution, or use of software.
- 16. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
