Computer Security
Across
- 2. Anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen but has the potential to cause serious damage.
- 6. Use of modern electronic means to manipulate an event or influence public perception toward a certain point of view.
- 8. Misuse This refers to entering a computer system without permission (hacking).
- 10. An attempt to make a machine or network resource unavailable to its intended users, such as temporarily or indefinitely interrupting or suspending services of a host connected to the internet.
- 13. Software that installs itself onto devices and then steals personal information about the user, like passwords, email addresses and other important information.
- 14. An action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS).
- 15. Is the use of technology to harass, threaten, embarrass, or target another person.
- 17. Pretends it will be a useful and safe program.
- 20. When someone accesses information without permission.
- 23. Theft Is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
- 24. A security barrier designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside.
- 25. Copying and distributing of recordings of a piece of music for which the rights owners (composer, recording artist, or copyright-holding record company) did not give consent.
- 26. Sending the same message indiscriminately to a large number of internet users.
Down
- 1. The act of intercepting communications between two points.
- 3. A flaw or weakness in a system or network that could leave it open to attacks or allow an attacker to manipulate the system in some way.
- 4. The protection of computing systems and the data that they store or access.
- 5. An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission.
- 7. The practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information online.
- 9. A malicious program or code that attaches itself to another program or file and can replicate itself, thereby infecting other systems.
- 11. Can spread from device to device, but unlike a virus they don’t need to attach themselves to other programs.
- 12. Gaining unauthorized access to data in a system or computer.
- 16. A network of private computers infected with malicious software and controlled as a group without the owner's knowledge, often used to send spam.
- 18. The act of illegally using, copying or distributing software without ownership or legal rights.
- 19. Any illegal activity that uses a computer as its primary means of commission.
- 21. Covert activities, such as the theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
- 22. The practice of using another person's name and personal information to obtain credit, loans, etc.