gg

1234567891011121314151617
Across
  1. 2. Although was originally a compliment, it is now a derogatory term referring to someone who accesses a computer or network illegally
  2. 3. Programs that act without a users knowledge and deliberately alter the computers operations
  3. 7. One whose owner is unaware the computer is being controlled remotely by an outsider
  4. 8. Technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
  5. 10. Verifies that the individual is the person they claim to be
  6. 12. A private combination of characters associated with user name allows access to certain computers
  7. 13. A potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the users knowledge
  8. 14. Online or internet based illegal acts
  9. 16. A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
  10. 17. A program that performs a repetitive task on a network
Down
  1. 1. Hardware or software that protects a networks resources from intrusion by users on another network such as the internet
  2. 2. A vulnerable computer that is set up to entice an intruder to break into it
  3. 4. Program, Protects a computer against viruses by identifying and removing any computer virus found in memory, storage, or incoming files
  4. 5. Software used by cybercriminals
  5. 6. Someone who accesses a computer or network illegally but has the intent of destroying data, stealing info, or other malicious actions
  6. 9. A server outside the organization's network that controls which communications pass into the organization's network
  7. 11. A numeric password either assigned by a company or selected by a user
  8. 15. A program that copies itself repeatedly, in memory or on a network using up resources and shutting down the computer or network
  9. 16. A group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks