Menu

The criminal use of computer systems - Match-up

Match-up definitions and answers with key terms and examples. Press submit to check your answers.

Computer Misuse Act
Unauthorised Access to Computer Material
Unauthorised Access with Intent to Commit Further Offences
Unauthorised Modification of Computer Material
Hacking
Identity Theft
Blackmail
Worms
Trojan Horses
Spyware


Answers
Malware that replicates itself in order to spread to other computers, typically causing harm to their systems and networks
Trying to gain access to a computer system without permission, such as using someone else's login details
The act of threatening to reveal compromising information about someone unless a demand, typically for money, is met
Illegally changing computer data or systems, such as installing malware like worms or trojan horses
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Accessing a computer system without permission with the intention to commit additional crimes like fraud or blackmail
The act of gaining unauthorised access to computer systems, often involving breaching security measures
Malicious software that misleads users of its true intent, often disguised as legitimate software
Legislation introduced to prevent unauthorised access and use of computer systems, including hacking and other cybercrimes
A type of fraud involving the unauthorised use of someone else's personal data, often for financial gain
Log in or sign-up to access the match-up activity



Don't have a login?

You can still revise this topic