Chapter 05 Digital Security, Ethics, and Privacy Final Test

1234567891011121314151617181920212223242526
Across
  1. 4. what is the term for a website that uses encryption techniques to protect its data
  2. 7. is the process of restricting access to certain material on the web
  3. 10. what refers to the right of individuals and companies to deny or restrict the collection and use of information about them
  4. 11. an IT code is a written guideline that helps determine whether a specific computer action is what
  5. 17. someone who demands payments in order to stop an attack on an organization's technology infrastructure
  6. 19. has the same intent as a cracker,but does not have the technical skills and knowledge
  7. 20. websites use what to keep track of items in a user's shopping cart
  8. 22. what refers to a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
  9. 24. what terms refer to someone accesses a computer or network illegally with the intent of malicious action
  10. 25. what gives authors and artist the exclusive rights to duplicate, publish,and sell their materials
  11. 26. what term means in a location separate from the computer site
Down
  1. 1. to read encrypted data, the recipient must decipher it into a readable form what is this called
  2. 2. what is the general term for programs that act without a user's knowledge and deliberately alter the computers operations
  3. 3. what is a program or set of instructions in a program that allows users to bypass security controls
  4. 5. what occurs when someone steals personal or confidential information
  5. 6. internet advertising firms often use what to collect information about users web browsing habits
  6. 7. which type of individual may steal credit card numbers to make fraudulent purchases
  7. 8. what can transmit germs
  8. 9. someone who uses the internet or network to destroy or damage computers for political reasons
  9. 12. property what categories are the rights to which creators are entitled for their work
  10. 13. what term is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
  11. 14. what terms refers to making a copy of a file
  12. 15. in which particular devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks
  13. 16. what is a scam in which a perpetrator sends an official looking email
  14. 18. many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources what is this
  15. 21. what is a small text file that a web server stores on a users computer
  16. 23. what term is used to describe a program that copies itself repeatedly using up resources and possibly shutting down the computer or network