Chapter 05 Digital Security, Ethics, and Privacy Final Test

12345678910111213141516171819202122232425
Across
  1. 3. which type of individual may steal credit card numbers to make fraudulent purchases
  2. 6. has the same intent as a cracker,but does not have the technical skills and knowledge
  3. 11. what gives authors and artist the exclusive rights to duplicate, publish,and sell their materials
  4. 12. what term is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
  5. 16. what refers to the right of individuals and companies to deny or restrict the collection and use of information about them
  6. 17. what is the term for a website that uses encryption techniques to protect its data
  7. 19. what terms refers to making a copy of a file
  8. 21. what occurs when someone steals personal or confidential information
  9. 23. many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources what is this
  10. 25. what is a scam in which a perpetrator sends an official looking email
Down
  1. 1. what term means in a location separate from the computer site
  2. 2. in which particular devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks
  3. 3. someone who demands payments in order to stop an attack on an organization's technology infrastructure
  4. 4. what terms refer to someone accesses a computer or network illegally with the intent of malicious action
  5. 5. to read encrypted data, the recipient must decipher it into a readable form what is this called
  6. 7. what is a small text file that a web server stores on a users computer
  7. 8. websites use what to keep track of items in a user's shopping cart
  8. 9. what can transmit germs
  9. 10. property what categories are the rights to which creators are entitled for their work
  10. 13. someone who uses the internet or network to destroy or damage computers for political reasons
  11. 14. what is a program or set of instructions in a program that allows users to bypass security controls
  12. 15. what is the general term for programs that act without a user's knowledge and deliberately alter the computers operations
  13. 17. what refers to a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
  14. 18. is the process of restricting access to certain material on the web
  15. 20. internet advertising firms often use what to collect information about users web browsing habits
  16. 22. an IT code is a written guideline that helps determine whether a specific computer action is what
  17. 24. what term is used to describe a program that copies itself repeatedly using up resources and possibly shutting down the computer or network