CYBERCRIME

1234567891011121314151617181920212223242526272829303132333435363738394041
Across
  1. 1. The interdependent network of information technology, infrastructures that includes internet.
  2. 3. A grou of computers that is linked to share data and othe information.
  3. 6. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. 10. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  5. 13. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  6. 14. The act of one individual harrasing or intimidating another individual via the interner.
  7. 18. Resource to be accessed, often expressed as a time period.
  8. 20. Refer to someone who gains access to a system, software, or hardware without permission.
  9. 21. A company that offers access the internet.
  10. 22. A network point that acts an entrance to another network
  11. 25. A website that finds information across the Internet based on a set of search criteria.
  12. 26. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  13. 29. A massed data that is used to describe large amounts of other internet data.
  14. 30. Stands for "Wireless Fidelity".
  15. 32. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  16. 34. An online journal.
  17. 35. Aim to overwhelm the resources of a targeted system to crash that system.
  18. 37. The overaching program that runs all the functions on a computer or other electronic device.
  19. 40. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. 41. An information packet sent from website to a web browser that records a user's activity on the website.
Down
  1. 2. Assurance that remains private and no one sees it except for those expected to see it.
  2. 4. algorithm against data to produce a numeric value that is representative that data.
  3. 5. A program used to access the internet.
  4. 7. Are a botnet of comprised hosts, controlled by a single intentity.
  5. 8. A politically- or ideologically-motivated cyber attack or hack.
  6. 9. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  7. 11. The process ofnusing a
  8. 12. A unique internet identifier registered
  9. 15. A network security measure in which information is encoded or scrambled prior to transmission.
  10. 16. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  11. 17. Hardware or software designed to prevent unathorized users from accessing a computer system.
  12. 19. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  13. 23. an entity.
  14. 24. A software robot that performs automated tasks.
  15. 27. A unique internet identifier registered to an entity.
  16. 28. A way to access electonic system by bypassing some or all security mechanisms.
  17. 31. A camera connectee to computer l, generally used to then stream videos to the internet.
  18. 33. Determining the identity or location of an attacker or an attacker's intermediary.
  19. 36. Unsolicited advertising or other information sent out via email or other messaging service.
  20. 38. Malicious software, such as a virus or worm, that attacks a target computer.
  21. 39. Attempting to mimic an official email from a trusted organization to lire individuals.