Computer Threats and Security
Across
- 1. / a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- 4. / the process of encoding a message so that it can be read only by the sender and the intended recipient
- 6. / zombie network-is a group of infected computers that are under the control of one or more individuals.
- 7. / the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- 9. / a destructive self replicating program containing code capable of gaining access to computers or networks.
- 10. Espionage / an occasion when one company steals secrets from another company with which it is competing.
- 11. / a software utility designed to protect your computer or network against computer viruses.
- 12. / a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- 13. guard / a person whose job is to guard a place
Down
- 2. theft / act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- 3. / the identification of a person by the measurement of their biological features.
- 5. monitors / a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- 7. camera / a video camera that is used to observe a location.
- 8. / malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- 14. Horse/ a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.