Computer Ethics and Security

1234567891011121314151617181920212223242526272829
Across
  1. 3. / Program that copies itself repeatedly
  2. 4. / Type of cyber criminal
  3. 6. / Trademark
  4. 8. / Damage files and system software
  5. 9. / Malicious code spread through network
  6. 12. / Fast temporary storage
  7. 14. / Network security system
  8. 16. / Raw information
  9. 18. / Safeguard against information theft
  10. 20. / The code of acceptable behavior users should follow while on the internet .
  11. 21. / Online crime
  12. 25. / Protect against malicious code infection
  13. 26. / Artistic
  14. 27. / Patent
  15. 29. / Decrease hardware performance and sometimes damage data
Down
  1. 1. / Patent to be granted
  2. 2. / Protector used to protect against electrical power variation
  3. 5. / A small text file that web server stores on your computer
  4. 7. / Physical access control
  5. 10. / Exploitation of a vulnerability in DNS server software
  6. 11. / Duplicate files and programs
  7. 12. / Lock laptop
  8. 13. / Cryptography
  9. 15. / Monitor that is better than CRT
  10. 17. / Process of identifying an individual
  11. 19. / System failure
  12. 22. / A scam using email to get personal info
  13. 23. / Unauthorized software
  14. 24. / Intruder attempts to gain unauthorized access to user's system or information by pretending to be user
  15. 28. / Example of cryptography software