Digital Security Risks
Across
- 4. spies on the activity of a computer without your knowledge
- 7. an assault whose purpose is to disrupt computer access to an internet service, such as the web or email
- 9. program designed to gain access to the "root" of a computer system
- 10. programs that install themselves on your computer without your knowledge or consent and deliberately alter the computer's operations
- 11. a website that uses encryption techniques to secure its data
- 12. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
- 13. software that delivers ads, mainly in a banner or pop-ups, to your desktop
- 14. online or internet-based illegal acts
- 16. a private combination of characters associated with a user name that allows access to certain resources
- 18. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
- 20. someone who accesses a computer or network illegally
- 23. type of hacker whose goal is to exploit the data and do harm
- 25. a compromised device whose owner is unaware the device is being controlled remotely by an outsider
- 26. program that can reproduce itself and spread from computer to computer through a file attachment
- 28. crime any illegal act involving the use of a computer or related devices
- 29. program that replicates itself and infects the entire network
- 31. use of passwords to make sure people accessing information are who they claim to be
- 34. a notice that guarantees a user or a website is legitimate
- 35. type of hacker who works to find the security breaches to improved security
- 36. someone who uses the internet or network to destroy or damage computers for political reasons
Down
- 1. can be used to learn passwords, account numbers, etc
- 2. someone who demands payment to stop an attack on an organization’s technology
- 3. has the same intent as a cracker but does not have the technical skills and knowledge
- 5. log on name, or sign in name
- 6. hardware and/or software that protects a network’s resources from intrusion by users on another network
- 8. decoding and reading encrypted data
- 15. an attack whose goal ranges from disabling a government’s computer network to crippling a country
- 17. any event or action that could cause a loss of or damage to a computer
- 19. someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions
- 21. a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
- 22. the destructive event or prank
- 24. a program that performs a repetitive task on a network
- 27. hides within a computer and looks like a legitimate program
- 30. a numeric password, either assigned by a company or selected by a user
- 32. practice of using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
- 33. program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money