Chapter 05 Final Digital Security, Ethics, & Privacy Crossword

12345678910111213
Across
  1. 2. what is a technique intruders use to make their network of Internet transmission appear legitimate to a victim computer or network
  2. 3. what is a program or set of instructions in a program that allows users to bypass security controls
  3. 5. what is the term for a website that uses encryption techniques to protect its data
  4. 7. to read encrypted data, the recipient must decipher it into a readable for. What is the term for this process
  5. 10. what can transmit germs
  6. 11. what occurs when someone steals personal or confidential information
  7. 13. is someone who demands payment in order to stop an attack on an organization's technology infrastructure
Down
  1. 1. a web server stores on a users computer
  2. 2. has the same intent as a cracker, but does not have the technical skills and knowledge
  3. 4. in which devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks
  4. 6. computer viruses, worms, trojan horses, and rootkits are classified as what
  5. 7. is any even or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  6. 8. what categories are the rights to which creators are entitled for their work
  7. 9. what term refers to making a copy of a file
  8. 12. what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials