RU ITEC411 Chapter 5
Across
- 3. t ricking people into giving access or information
- 5. hacking to support a political or social cause
- 7. using body features like fingerprints for security
- 9. software that looks safe but is actually harmful
- 11. a weakness in a system that can be exploited
- 13. scrambling data so only authorized users can read it
- 14. a program that spreads on its own through networks
- 16. a program that spreads by attaching to other files
- 17. a system that blocks unwanted network access
- 19. getting into a computer system without permission
- 22. a hidden way to access a system later
- 24. a software update that fixes security problems
- 25. a group of infected devices controlled by a hacker
- 26. fake messages used to trick people into giving information
Down
- 1. harmful software made to damage or steal data
- 2. protecting systems networks and data from attacks
- 4. important systems like power or hospitals that must stay running
- 6. a group that responds to cybersecurity emergencies
- 8. proving a user is who they say they are
- 10. software that locks files and demands money to unlock them
- 12. using someone else personal information for fraud
- 15. software that secretly watches what a user does
- 18. a hacker who breaks the law and causes harm
- 20. a hacker who is between good and bad
- 21. an attack that overloads a website so it stops working
- 23. a hacker who helps improve security