Digital Security Risks

123456789101112131415161718192021222324252627282930313233343536
Across
  1. 4. spies on the activity of a computer without your knowledge
  2. 7. an assault whose purpose is to disrupt computer access to an internet service, such as the web or email
  3. 9. program designed to gain access to the "root" of a computer system
  4. 10. programs that install themselves on your computer without your knowledge or consent and deliberately alter the computer's operations
  5. 11. a website that uses encryption techniques to secure its data
  6. 12. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  7. 13. software that delivers ads, mainly in a banner or pop-ups, to your desktop
  8. 14. online or internet-based illegal acts
  9. 16. a private combination of characters associated with a user name that allows access to certain resources
  10. 18. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
  11. 20. someone who accesses a computer or network illegally
  12. 23. type of hacker whose goal is to exploit the data and do harm
  13. 25. a compromised device whose owner is unaware the device is being controlled remotely by an outsider
  14. 26. program that can reproduce itself and spread from computer to computer through a file attachment
  15. 28. crime any illegal act involving the use of a computer or related devices
  16. 29. program that replicates itself and infects the entire network
  17. 31. use of passwords to make sure people accessing information are who they claim to be
  18. 34. a notice that guarantees a user or a website is legitimate
  19. 35. type of hacker who works to find the security breaches to improved security
  20. 36. someone who uses the internet or network to destroy or damage computers for political reasons
Down
  1. 1. can be used to learn passwords, account numbers, etc
  2. 2. someone who demands payment to stop an attack on an organization’s technology
  3. 3. has the same intent as a cracker but does not have the technical skills and knowledge
  4. 5. log on name, or sign in name
  5. 6. hardware and/or software that protects a network’s resources from intrusion by users on another network
  6. 8. decoding and reading encrypted data
  7. 15. an attack whose goal ranges from disabling a government’s computer network to crippling a country
  8. 17. any event or action that could cause a loss of or damage to a computer
  9. 19. someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions
  10. 21. a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  11. 22. the destructive event or prank
  12. 24. a program that performs a repetitive task on a network
  13. 27. hides within a computer and looks like a legitimate program
  14. 30. a numeric password, either assigned by a company or selected by a user
  15. 32. practice of using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
  16. 33. program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money