Chapter 05 Digital Security, Ethics, and Privacy Final Test
Across
- 3. which type of individual may steal credit card numbers to make fraudulent purchases
- 6. has the same intent as a cracker,but does not have the technical skills and knowledge
- 11. what gives authors and artist the exclusive rights to duplicate, publish,and sell their materials
- 12. what term is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
- 16. what refers to the right of individuals and companies to deny or restrict the collection and use of information about them
- 17. what is the term for a website that uses encryption techniques to protect its data
- 19. what terms refers to making a copy of a file
- 21. what occurs when someone steals personal or confidential information
- 23. many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources what is this
- 25. what is a scam in which a perpetrator sends an official looking email
Down
- 1. what term means in a location separate from the computer site
- 2. in which particular devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks
- 3. someone who demands payments in order to stop an attack on an organization's technology infrastructure
- 4. what terms refer to someone accesses a computer or network illegally with the intent of malicious action
- 5. to read encrypted data, the recipient must decipher it into a readable form what is this called
- 7. what is a small text file that a web server stores on a users computer
- 8. websites use what to keep track of items in a user's shopping cart
- 9. what can transmit germs
- 10. property what categories are the rights to which creators are entitled for their work
- 13. someone who uses the internet or network to destroy or damage computers for political reasons
- 14. what is a program or set of instructions in a program that allows users to bypass security controls
- 15. what is the general term for programs that act without a user's knowledge and deliberately alter the computers operations
- 17. what refers to a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
- 18. is the process of restricting access to certain material on the web
- 20. internet advertising firms often use what to collect information about users web browsing habits
- 22. an IT code is a written guideline that helps determine whether a specific computer action is what
- 24. what term is used to describe a program that copies itself repeatedly using up resources and possibly shutting down the computer or network