Computer Security and Viruses
Across
- 1. A group of two or more computer systems linked together.
- 4. The study of people's efficiency in their working environment.
- 8. The process by which you store the files on a single storage media with no secondary copies.
- 10. A program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
- 11. A program designed to detect and destroy computer viruses.
- 15. A way of backing up the computer that allows you to store the entire computer, including the operating system and programs, in a single file (an “image”) that can be used to restore the computer to exactly the way it was when the image was made.
- 16. The process of using an algorithm to transform information to make it unreadable for unauthorized users.
- 18. An act of crime in which a computer is the object of the crime.
- 19. an electronic discovery technique used to determine and reveal technical criminal evidence.
- 21. The act of making set of instructions.
- 23. The programs and other operating information used by a computer.
- 26. A software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- 27. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- 29. A feature or defect of a computer system that allows surreptitious unauthorized access to data.
- 30. It is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
- 32. Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Down
- 2. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or PDA.
- 3. The acto of gaining unauthorized access to protected data.
- 5. A software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
- 6. An act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.
- 7. A person within a group or organization, especially someone privy to information unavailable to others.
- 9. It refers to the physical parts of a computer system.
- 12. The state of being free from danger or threat.
- 13. The distinct pieces of digital information.
- 14. An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
- 17. The use of computers and related resources in an environmentally responsible manner.
- 18. A person who breaks into a computer system, typically for an illegal purpose.
- 20. The Father of Computers.
- 21. A person that codes the set of instructions for the computer.
- 22. A software that is intended to damage or disable computers and computer systems.
- 23. Refers to tricking or deceiving computer systems or other computer users
- 24. An organized collection of data.
- 25. A type of network, the "V" in VPN.
- 28. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- 31. A person who uses computers to gain unauthorized access to protected data.