Answers
Malware that replicates itself in order to spread to other computers, typically causing harm to their systems and networks
Trying to gain access to a computer system without permission, such as using someone else's login details
The act of threatening to reveal compromising information about someone unless a demand, typically for money, is met
Illegally changing computer data or systems, such as installing malware like worms or trojan horses
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Accessing a computer system without permission with the intention to commit additional crimes like fraud or blackmail
The act of gaining unauthorised access to computer systems, often involving breaching security measures
Malicious software that misleads users of its true intent, often disguised as legitimate software
Legislation introduced to prevent unauthorised access and use of computer systems, including hacking and other cybercrimes
A type of fraud involving the unauthorised use of someone else's personal data, often for financial gain