Internet Security
Across
- 2. Computer criminals. Otherwise known as 'black-hat hatters'
- 4. Software created to damage or alter the computer data or its operations
- 7. An electronic way of proving your identity (2 words)
- 10. A self-copying program that has the capacity to move from one computer to another without human help, by exploiting security flaws
- 12. Software designed to collect information from computers for commercial or criminal purposes
- 13. Email fraud conducted for the purposes of information or identity theft
Down
- 1. A fraudulent or deceptive act or operation
- 3. To alter using a secret code so as to be unitelligible to unauthorised parties
- 5. A program designed to protect against viruses
- 6. A program designed to prevent spyware from gaining access to the internal network
- 8. A malicious program disguised as innocent-looking files or embedded within legitimate software. It doesn't copy itself (2 words)
- 9. Anonymous:noun
- 11. A program that spreads by attaching itself to executable files or documents
- 13. The unauthorised reproduction or use of copyrighted books, music etc