APPLECOMPUTER
BACKUP
CIPHER
COMPUTERCRIME
CRACKER
CYBERCRIME
DATA
DOMAINNAME
ENCRYPT
ENCRYPTION
FILE
FIREWALL
HACKER
HARDWARE
ISOHUNT
MICROSOFT
MODIFYING
NETWORK
OPERATINGSYSTEM
PACKET
PARACY
PROXYSERVER
SNIFFER
SOFTWARE
SPYBOT
SPYWARE
TECHNOLOGY
TROJANS
VIRUSES
WORMS
|
CYBER CRIME AND SECURITY ISSUES Try to find all 30 words on this board.
Z | M | U | D | Y | F | T | V | O | V | I | R | U | S | E | S | F | P | K | F |
F | Q | D | P | E | W | H | A | U | Q | V | T | N | K | L | E | T | A | K | K |
H | K | U | N | B | T | N | U | H | O | S | I | G | B | R | B | E | L | Y | Z |
A | L | D | M | I | C | R | O | S | O | F | T | H | A | Z | Q | L | D | K | X |
C | K | Z | O | E | B | D | H | T | F | X | A | W | U | R | A | K | C | D | L |
K | H | U | D | C | T | I | P | E | F | R | T | M | G | W | R | I | K | P | V |
E | E | R | I | R | M | S | R | N | D | F | Y | A | E | O | N | R | P | K | E |
R | Z | P | F | B | E | N | Y | W | O | V | K | R | W | B | O | E | Z | F | D |
Y | Y | O | Y | I | U | K | A | S | E | K | I | T | O | A | I | V | B | E | K |
I | H | A | I | S | L | R | C | U | G | F | E | R | R | C | T | R | E | M | G |
F | T | I | N | M | E | E | H | A | C | N | Q | U | M | K | P | E | M | I | N |
H | O | K | G | F | J | W | Q | T | R | B | I | K | S | U | Y | S | A | R | C |
V | G | R | Y | G | O | L | O | N | H | C | E | T | T | P | R | Y | N | C | M |
R | R | E | T | U | P | M | O | C | E | L | P | P | A | F | C | X | N | R | R |
E | H | K | R | H | T | I | T | T | V | V | M | Q | C | R | N | O | I | E | Q |
H | F | L | O | A | G | E | O | Q | T | P | Y | R | C | N | E | R | A | B | R |
P | D | S | J | C | B | B | W | Y | U | M | T | E | K | C | A | P | M | Y | D |
I | E | V | A | Q | Y | E | M | I | R | C | R | E | T | U | P | M | O | C | T |
C | H | M | N | P | A | R | A | C | Y | U | A | D | Q | A | T | A | D | T | F |
B | C | H | S | P | Y | W | A | R | E | Z | W | R | Q | F | X | I | G | W | O |
|