CYBERCRIME
Across
- 1. The interdependent network of information technology, infrastructures that includes internet.
- 3. A grou of computers that is linked to share data and othe information.
- 6. A log that chronicles any changes made to a document, presentation, software applications, etc.
- 10. A program that masks something harmful, such as a worm or virus, that it carries into a device.
- 13. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- 14. The act of one individual harrasing or intimidating another individual via the interner.
- 18. Resource to be accessed, often expressed as a time period.
- 20. Refer to someone who gains access to a system, software, or hardware without permission.
- 21. A company that offers access the internet.
- 22. A network point that acts an entrance to another network
- 25. A website that finds information across the Internet based on a set of search criteria.
- 26. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- 29. A massed data that is used to describe large amounts of other internet data.
- 30. Stands for "Wireless Fidelity".
- 32. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- 34. An online journal.
- 35. Aim to overwhelm the resources of a targeted system to crash that system.
- 37. The overaching program that runs all the functions on a computer or other electronic device.
- 40. The changes in data caused by an intruder or investigator accessing files and running applications or process.
- 41. An information packet sent from website to a web browser that records a user's activity on the website.
Down
- 2. Assurance that remains private and no one sees it except for those expected to see it.
- 4. algorithm against data to produce a numeric value that is representative that data.
- 5. A program used to access the internet.
- 7. Are a botnet of comprised hosts, controlled by a single intentity.
- 8. A politically- or ideologically-motivated cyber attack or hack.
- 9. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- 11. The process ofnusing a
- 12. A unique internet identifier registered
- 15. A network security measure in which information is encoded or scrambled prior to transmission.
- 16. A satellite navigation system that indentifies the precise lovation of the transmitting device.
- 17. Hardware or software designed to prevent unathorized users from accessing a computer system.
- 19. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- 23. an entity.
- 24. A software robot that performs automated tasks.
- 27. A unique internet identifier registered to an entity.
- 28. A way to access electonic system by bypassing some or all security mechanisms.
- 31. A camera connectee to computer l, generally used to then stream videos to the internet.
- 33. Determining the identity or location of an attacker or an attacker's intermediary.
- 36. Unsolicited advertising or other information sent out via email or other messaging service.
- 38. Malicious software, such as a virus or worm, that attacks a target computer.
- 39. Attempting to mimic an official email from a trusted organization to lire individuals.