Data Security

123456789
Across
  1. 2. the practice of sending emails pretending to be from reputable companies in order to cause individuals to reveal personal information, such as passwords and credit card numbers
  2. 3. the gaining of unauthorized access to data in a system or computer
  3. 4. This protects computers on a network from intentional hostile intrusion which could result in data corruption or denial of service
  4. 6. downloading software and other copyrighted material illegally
  5. 8. stealing data and information and presenting it as your own
  6. 9. this term refers to all malicious programs, but in essence, it’s a code that attaches itself to a legitimate, piece of software and then reproduces itself when that file is run
Down
  1. 1. the practice of using another person's name and personal information in order to obtain credit, loans, etc.
  2. 5. this is the process of converting plain text using a cipher (an algorithm) to make it unreadable to anyone who does not have a key
  3. 7. bullying people online
  4. 8. this refers to characters used for validating a user on a computer system. A username along with a password is usually used