Cyber Crime
Across
- 5. It is the part of the malware program that actually executes its designed task
- 6. It is a form of social engineering carried out in electronic form, usually by email, with the purpose of gathering sensitive information.
- 7. It is simply unsolicited email, also known as junk email
- 11. It is a security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users
- 13. A non-malicious surprise contained in a program or on a circuit board installed by the developer
- 14. It is someone who breaks into a computer system or network without authorization and with the intention of doing damage
- 16. It is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there
- 17. It is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network
- 18. It is a non-destructive program that is designed to log every keystroke made on a computer
Down
- 1. It is the art of misdirection
- 2. The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber-criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion
- 3. It includes viruses, Trojans, worms, time bombs, logic bombs, or anything else intended to cause damage upon the execution of the payload
- 4. It is used to track a user’s Internet surfing habits for advertising purposes in an effort to match user's interests with relevant ads
- 8. It is a malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems
- 9. It is a software designed to force pre-chosen ads to display on your system
- 10. It is a small packet of information from a visited webserver stored on your system by your computer’s browser to store personalized information in order to customize your next visit
- 12. It is a malicious program designed to execute when a certain criterion is met.
- 15. It is a software “robot” that performs an extensive set of automated tasks on its own