This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Computer Crime

| See more in IT Security

Chapter 10 - G10 D&C

DuhaRafiq
Created Date 04.08.20
Last Updated 04.08.20
Viewed 2 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • A person who uses computers to gain unauthorized access to data.
  • Program that can make copies of its self in order to infect other computers
  • Infected disks, Flash memory, downloaded files or E-mail
  • The act of using a computer to take or alter electronic data
  • Distributed unsolicited e-mails to hundreds of different addresses, eg. Advertisements
  • Deceiving a system into thinking you are some one you are not
  • Is a computer program used to prevent, detect, and remove malware (viruses) from a computer
  • criminal activity that involves the use of computers or networks such as the internet
  • Help the data to be restored back to its original condition