Chapter 05 Digital Security, Ethics, and Privacy Final Test
Across
- 4. what is the term for a website that uses encryption techniques to protect its data
- 7. is the process of restricting access to certain material on the web
- 10. what refers to the right of individuals and companies to deny or restrict the collection and use of information about them
- 11. an IT code is a written guideline that helps determine whether a specific computer action is what
- 17. someone who demands payments in order to stop an attack on an organization's technology infrastructure
- 19. has the same intent as a cracker,but does not have the technical skills and knowledge
- 20. websites use what to keep track of items in a user's shopping cart
- 22. what refers to a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
- 24. what terms refer to someone accesses a computer or network illegally with the intent of malicious action
- 25. what gives authors and artist the exclusive rights to duplicate, publish,and sell their materials
- 26. what term means in a location separate from the computer site
Down
- 1. to read encrypted data, the recipient must decipher it into a readable form what is this called
- 2. what is the general term for programs that act without a user's knowledge and deliberately alter the computers operations
- 3. what is a program or set of instructions in a program that allows users to bypass security controls
- 5. what occurs when someone steals personal or confidential information
- 6. internet advertising firms often use what to collect information about users web browsing habits
- 7. which type of individual may steal credit card numbers to make fraudulent purchases
- 8. what can transmit germs
- 9. someone who uses the internet or network to destroy or damage computers for political reasons
- 12. property what categories are the rights to which creators are entitled for their work
- 13. what term is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
- 14. what terms refers to making a copy of a file
- 15. in which particular devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks
- 16. what is a scam in which a perpetrator sends an official looking email
- 18. many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources what is this
- 21. what is a small text file that a web server stores on a users computer
- 23. what term is used to describe a program that copies itself repeatedly using up resources and possibly shutting down the computer or network