You are on page 1of 2

Internet

Across Down
5. self-copying programs that have the 1. a program designed to prevent spyware
capacity to move from one computer to from gaining access to the internal
another without human help, by network...
exploiting security flaws in computer 2. programs that spread by attaching
networks... themselves to executable files or
7. the illegal copying and distribution of documents...
copyrighted software, information, music 3. malicious programs disguised as innocent-
and video files, is widespread...
    looking files or embedded within
8. software created to damage or alter the legitimate software...
computer data or its operations.... 4. software designed to collect information
9. bank fraud, to get banking information from computers for commercial or criminal
such as passwords of Internet bank purposes, is another example of malicious
accounts or credit card details... software...
10. Computer criminals who use technology 6. email fraud to obtain money or valuables...
to perform a variety of crimes: virus
propagation, fraud, intellectual property
theft...
Internet

Across Down
5. self-copying programs that have the 1. a program designed to prevent spyware
capacity to move from one computer to from gaining access to the internal
another without human help, by network...
exploiting security flaws in computer 2. programs that spread by attaching
networks... themselves to executable files or
7. the illegal copying and distribution of documents...
copyrighted software, information, music 3. malicious programs disguised as innocent-
and video files, is widespread...
    looking files or embedded within
8. software created to damage or alter the legitimate software...
computer data or its operations.... 4. software designed to collect information
9. bank fraud, to get banking information from computers for commercial or criminal
such as passwords of Internet bank purposes, is another example of malicious
accounts or credit card details... software...
10. Computer criminals who use technology 6. email fraud to obtain money or valuables...
to perform a variety of crimes: virus
propagation, fraud, intellectual property
theft...

You might also like