1.digital security risk.
2.computer crime
3...is a online or internet based act/cyber crime
4. is short for Millis software /
5.server
6.disrupt access to internet services
7.a set of instruction in a programs to allow users to by pass controls /backdoor
8.is a technique to make there internet appear illegal /spoofing
9.is hardware or software that protect network resources from.../firewall and intrusions'
10.is the use of a computer or network without permission /
11.is the use of the computer of un approved activity /unauthorized use
12.tellls a person true identify
13.is the discover collection and analysis that is find on computers and network
14.is someone who /
15.when someone steal confidential information /information theft
16.is the process of converting data /
17.is a incepted code that a person organization
18.is a notice that guaranty a user that the page is illegal
19.a website that uses ...technique to secure his data is known as a secure site/inception
20..act of stealing digital equipment/
21.act of destroying digital equipment./
22.back up
23.a guideline that govern the use of computers /computer ethics
24.the right which is a creators are entitled to there work./intellectual property
25.that determines specification are allowed or not allowed./code of conduct
26.to design to help prevent illegal/digital right management
27? is the owners choice if someone can make copies or preform it in a show./copy rite
28.a program the secretly collects information about the user./spy ware
29.a program that displays
30.social engineering
31. green computing is a computer that is helpful for the envorment
32.what is the rite of companies/
33.is a small text file that a web stores on the computer
34 involves reviewing a employee use of the computer