L31 Crossword: Computer Safety and Ethics
Across
- 6. A security method that requires more information than a password to authenticate your identity.
- 12. A small text file that a Web server puts on your computer to store information about you and your preferences.
- 13. Protects against unwanted access to or from all the computers in a network from one point.
- 14. A file that copies itself and triggers computer code to infect your computer.
- 15. A virus that does not cause damage until a specified date or until the system has been launched a certain number of times.
- 17. A malicious program that records keystrokes.
- 20. Provides remote access to software applications hosted on the Internet.
- 22. Blocks unauthorized access or use to or from a network based on the specified security criteria.
- 23. Refers to software in which the source code is available free of charge to the general public for use and/or modification.n
- 24. The suppression of Web content that is considered offensive or a threat to security.
- 25. Unlawful reproduction and/or distribution of any copyrighted digital files including videos, music, e-books, and software.
- 27. Encrypts information.
Down
- 1. Maleware that hides inside another program, and infects a computer when the program is installed.
- 2. Short for "malicious software," software that is designed to cause damage to a single computer server, or computer network.
- 3. A fraudulent attempt to steal one's personal information to commit identity theft.
- 4. Software that the developer has donated for public use or for which the copyright has expired; it is the only type of software that is not copy-right protected.
- 5. A virus triggered by the appearance or disappearance of specified data.
- 7. Harmful computer code that spreads without your interaction.
- 8. Technology that encrypts sensitive information and authenticates servers and clients to ensure a secure connection.
- 9. Copyrighted software the developer makes available to users free of charge, or for a voluntary fee.
- 10. Technology that encrypts sensitive information and authenticates servers and clients to ensure a secure connection.
- 11. Software that monitors your computing actions, usually while you are online, to collect information about you.
- 16. Noncommercial copyrighted software distributed free of charge, usually for a trial period; after the trial period, the license generally requires that users pay a fee for continued use.
- 18. Deciphers encrypted information.
- 19. An electronic document that verifies the identity of a person or company and confirms that they own a public key.
- 21. Software as a Service; provides remote access to software hosted in the Cloud.
- 26. Used to block content coming into and going out to the Internet.