Computer Security, and Safety, Ethics, and Privacy

12345678910
Across
  1. 6. discovery, collection, and analysis of evidence found on computers and networks
  2. 8. "Completely Automated Turing test"; a program that verifies user input is not computer generated
  3. 10. state of being free from danger or threat
Down
  1. 1. private combination of characters that allows access to certain resources
  2. 2. online or internet-based illegal acts
  3. 3. duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
  4. 4. the last word from our topic's title
  5. 5. a potentially damaging computer program
  6. 7. the process of converting readable data into unreadable characters to prevent unauthorized access
  7. 9. action or crime of stealing