Chapter 05 Final Digital Security, Ethics, & Privacy Crossword
Across
- 2. what is a technique intruders use to make their network of Internet transmission appear legitimate to a victim computer or network
- 3. what is a program or set of instructions in a program that allows users to bypass security controls
- 5. what is the term for a website that uses encryption techniques to protect its data
- 7. to read encrypted data, the recipient must decipher it into a readable for. What is the term for this process
- 10. what can transmit germs
- 11. what occurs when someone steals personal or confidential information
- 13. is someone who demands payment in order to stop an attack on an organization's technology infrastructure
Down
- 1. a web server stores on a users computer
- 2. has the same intent as a cracker, but does not have the technical skills and knowledge
- 4. in which devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks
- 6. computer viruses, worms, trojan horses, and rootkits are classified as what
- 7. is any even or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
- 8. what categories are the rights to which creators are entitled for their work
- 9. what term refers to making a copy of a file
- 12. what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials