CSAM20 Week 1
Across
- 2. A malicious software program used to record every key stroke made on keyboards, giving hackers the ability to determine account information.
- 3. Social engineering and scams are designed to trick users into giving up their _____ information.
- 5. A network type publicly open to everyone, including hackers.
- 8. Who sings the famous song, Eye of the Tiger?
- 9. Fraudulent use of a person's confidential identifying information is known as _____ theft.
- 10. Another word used for "malicious software".
Down
- 1. The art of protecting software, hardware and data on computer systems and networks against malicious activity.
- 4. A malicious software disguised as a legitimate program.
- 6. Phishing involves attachments or illegitimate website links sent via _____ that consist of malware or impersonates credible sources in attempt to receive confidential information.
- 7. An unwanted software that steals your internet usage data and confidential information, watching your every move.