Relacionar Columnas Cyber Security IssuesVersión en línea Review your knowledge in cyber security. por Juan .-. 1 2 3 4 5 6 7 8 9 10 Data deleted from a computer system on purpose and without permission to cause problems for individuals, organizations and states. Gaining access to computer systems, networks, programs and data without permission. Software including viruses, worms, Trojan horses and spyware, used to steal, encrypt r delete data, alter or hijack computing functions or monitor users' computer activity. The account is locked due to failed login attempts. Stealing computer based information from an unknown victim with intent of compromising privacy or obtaining confidential information. Permanent deletion of data. Illegally using a computer to access information stored on another computer system or to spread a virus. Information passed to a person, organization or state without permission of the owner. An attack to shutdown a computer system, network or website, making it inaccessible. Obtaining the rights to access and edit information that normal users do not normally have.