LiTe Crossword Puzzle
Across
- 1. An individual who breaks into computer systems to steal, change, or destroy information.
- 3. One of the more common methods of both sending information out and collecting it from unsuspecting people.
- 7. Use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- 8. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- 9. Any action derived from intelligent threats to violate the security of the system.
- 12. The process of detecting and preventing illegal or unauthorized use of a computerand preventing intruders from accessing any part of a computer system.
- 13. A term used to describe actions taken by someone to gain unauthorized access to a computer.
- 14. An act or instance of using or closely imitating the language and thoughts of another author without authorization.
- 17. An unprivileged false statement of fact which tends to harm the reputation of a person or company.
- 19. It is an executable file that will install itself and run automatically once it's downloaded.
- 20. Any action of stealing information from a users system.
Down
- 2. Ensuring that the information is accessible to authorized persons when required without delay.
- 4. Refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- 5. One of the more common ways to infiltrate or damage of your computer.
- 6. An action or event that has the potential to compromise and/or violate security.
- 10. Often used by third parties to infiltrate your computer.
- 11. A defined method of breaching the security of an IT system through vulnerability.
- 15. The applications on the computers and operating system.
- 16. A common type of online fraud.
- 18. The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.