Internet & Security
Across
- 5. feature in internet explorer that lets you view websites without the browser storing data about your browsing session.
- 6. to create a website that lloks exactly like another legitimate site on the web, but steals the information people enter.
- 10. feature in the internet explorer that helps prevent websites or third-party developers from collecting information about the sites you visit.
- 14. an illict activity used by hackers to trick computer users into revealing personal or financial through email massage or website.
- 15. software that track a computer user's internet usage and sends this data back to the company or person that created it, usually without the computer user's permission or knowlegde.
- 17. a feature in internet explorer 8 that hepls detect phishing websites.
- 19. a descriptive word or phrase you enter to obtain a list of results that include that word or phrase.
- 20. the steps a computer owner takes to prevent unauthorized use of or damage to the computer.
Down
- 1. stores and organizes the link to the webpage that you want to revisit often.
- 2. software that searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands.
- 3. a software that lets you open and display website.
- 4. window that opens on your screen as you visit websites, generally to advertise products you may or may not want.
- 7. a string of at least eight characters of upper and lowercase letters and numbers.
- 8. verifies the indentity of a person or indicates the security of a website.
- 9. allows you to open more than one webpage at a time in a browser window.
- 11. to break into a DNS server and redirect any attempts to access a particular website to a spoofed site.
- 12. hardware or software that prevents other computers on the internet from accessing a computer or prevents a program on a computer from accessing the internet.
- 13. a special website that searches the internet for websites based on words or phrases that you enter.
- 16. a harmful program thyat intructs a computer to perform destructive activities, such as erasing a disk drive.
- 18. a broad term that describes and program that is intended to cause harm or convey information to others withoutthe owner's permission.