Data Security
Across
- 2. the practice of sending emails pretending to be from reputable companies in order to cause individuals to reveal personal information, such as passwords and credit card numbers
- 3. the gaining of unauthorized access to data in a system or computer
- 4. This protects computers on a network from intentional hostile intrusion which could result in data corruption or denial of service
- 6. downloading software and other copyrighted material illegally
- 8. stealing data and information and presenting it as your own
- 9. this term refers to all malicious programs, but in essence, it’s a code that attaches itself to a legitimate, piece of software and then reproduces itself when that file is run
Down
- 1. the practice of using another person's name and personal information in order to obtain credit, loans, etc.
- 5. this is the process of converting plain text using a cipher (an algorithm) to make it unreadable to anyone who does not have a key
- 7. bullying people online
- 8. this refers to characters used for validating a user on a computer system. A username along with a password is usually used