Ethical Computer Use Crossword!
Across
- 4. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it
- 5. attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a website
- 6. The state of being free from danger, threat, or breach of personal info
- 8. an error, fault or flaw in any computer program or a hardware system
- 10. a security program designed to prevent, detect, search and remove viruses
- 12. a person who breaks into a computer system
- 14. the programs and other operating information used by a computer.
- 15. intrusive software developed by hackers to steal data and damage or destroy computers and computer systems
- 16. attempts to steal, expose, alter, disable, or destroy another's assets through unauthorized access to computer systems
- 17. a worldwide system of computer networks
Down
- 1. the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, and other personal information
- 2. a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- 3. connected to, served by, or available through a system and especially a computer or telecommunications system
- 4. a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or hardware
- 7. a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program
- 9. The ability to keep your personal information safe from others
- 10. The process of verifying the claimed identity of a user, device, or other entity in a computer system
- 11. any unsolicited communication sent in bulk
- 13. the act of stealing information stored on corporate databases, computers, servers, or electronic devices to obtain sensitive information or compromise privacy