|
|
1
|
The most popular method used by a terrorist
|
4
|
These attacks are aimed at denying authorized persons access to a computer or computer network
|
5
|
This is more treacherous as it exploits the confidence of the user in the system
|
6
|
Computer Virus
|
7
|
Cyber terrorism word coined by
|
8
|
kind of attack in which the computer infrastructure is damaged
|
9
|
UN organization dedicated to promoting the use and protection of works of the human spirit
|
10
|
A patent is a protection given to a patentee for an invention for a limited term by the government
|
11
|
Terrorists have started using this kind of encryption technology
|
12
|
The computer infrastructure is damaged by modifying the logic of the system
|
|