Relier Pairs Cyber Security IssuesVersion en ligne Review your knowledge in cyber security. par Juan .-. 1 2 3 4 5 6 7 8 9 10 Obtaining the rights to access and edit information that normal users do not normally have. Stealing computer based information from an unknown victim with intent of compromising privacy or obtaining confidential information. Permanent deletion of data. Gaining access to computer systems, networks, programs and data without permission. Data deleted from a computer system on purpose and without permission to cause problems for individuals, organizations and states. An attack to shutdown a computer system, network or website, making it inaccessible. Information passed to a person, organization or state without permission of the owner. Software including viruses, worms, Trojan horses and spyware, used to steal, encrypt r delete data, alter or hijack computing functions or monitor users' computer activity. Illegally using a computer to access information stored on another computer system or to spread a virus. The account is locked due to failed login attempts.