CSAM20 Week 1

12345678910
Across
  1. 2. A malicious software program used to record every key stroke made on keyboards, giving hackers the ability to determine account information.
  2. 3. Social engineering and scams are designed to trick users into giving up their _____ information.
  3. 5. A network type publicly open to everyone, including hackers.
  4. 8. Who sings the famous song, Eye of the Tiger?
  5. 9. Fraudulent use of a person's confidential identifying information is known as _____ theft.
  6. 10. Another word used for "malicious software".
Down
  1. 1. The art of protecting software, hardware and data on computer systems and networks against malicious activity.
  2. 4. A malicious software disguised as a legitimate program.
  3. 6. Phishing involves attachments or illegitimate website links sent via _____ that consist of malware or impersonates credible sources in attempt to receive confidential information.
  4. 7. An unwanted software that steals your internet usage data and confidential information, watching your every move.