Digital Security, Ethics, and Privacy

1234567891011121314151617181920212223
Across
  1. 4. A set of instructions in a program that allows users to bypass security controls
  2. 5. The process of sharing computing resources among computers and devices on a network
  3. 7. A type of attack that overloads a resource, thus making it unavailable to legitimate users
  4. 8. A ratio that measures how much power enters a computer facility compared to how much power is used
  5. 10. All data is backed up whenever a change is made
  6. 11. A unique hardware identifier for your device
  7. 13. Protects individuals against the wrongful disclosure of their health information
  8. 15. The discovery, collection, and analysis of evidence found on a computer or network
  9. 16. The phase of disaster recovery that includes the evacuation plan
  10. 17. A normal looking yet fraudulent Wi-Fi network
  11. 18. A program that copies itself repeatedly and spreads throughout the network without human help
  12. 20. An animal loving hacker who might deface the website of a local meat packing plant
  13. 22. Technique used by attackers to make their traffic look legitimate to the victim device
  14. 23. A common infringement of copyright
Down
  1. 1. The process of ensuring that the person requesting access to a computer or network is not an imposter
  2. 2. Online or Internet-based illegal acts
  3. 3. Attacks that attempt to trick the victim into giving information to the attacker
  4. 6. The movement to ensure that all users have access to devices, data, and infrastructure
  5. 7. The record of everything you do online
  6. 9. A private secure path across a public network
  7. 10. The process of restricting access to certain material
  8. 12. A part of the web that is accessed using special software, providing anonymity to its users
  9. 14. A private combination of words associated with a username
  10. 19. Any event or action that could cause loss or damage
  11. 21. A type of authentication that combines multiple types of authentication to provide more secure access