Unit 13

Gap-fill exercise

Fill in all the gaps, then press "Check" to check your answers. Use the "Hint" button to get a free letter if an answer is giving you trouble. You can also click on the "[?]" button to get a clue. Note that you will lose points if you ask for hints or clues!
1) is a criminal activity that either targets or uses a computer, a computer network or a networked device.
2) Most, but not all, cybercrimes are committed by cybercriminals or hackers who want to .
3) Cybercrimes can be сommitted by or organizations.
4) Cybercrime that computers often involves viruses and other types of malware.
5) Cybercrime that computers to commit other crimes may involve using computers or networks to spread malware, illegal information or illegal images.
6) Sometimes cybercriminals both categories of cybercrimes at once.
7) Agencies should begin with areas of urgent need.
8) Officers can then take that data and use it to the incident and minimize the damage.
9) Law enforcement agencies must be able to take of the many sources of data available to them.
10) The can identify patterns in very complex data sets and provide recommendations on how to proceed in investigations.