LEARNING UNIT 2 - Protecting information Resources Puzzle
Across
- 2. involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking.
- 3. The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made.
- 4. is a type of malicious software -- or malware -- that is installed on a computing device.
- 5. Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.
- 6. Someone who uses the Internet to illegally break into computers.
- 9. is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
- 11. is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
- 13. in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer.
- 14. is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
- 15. Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
Down
- 1. The capturing of information from the magnetic stripe on your ATM and credit card by use of portable "skimmer" devices that are secretly installed on card-reading machines.
- 2. is an act performed by a knowledgeable computer user, sometimes called a "hacker," that illegally browses or steals a company's or individual's private information. Sometimes, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
- 7. is any kind of fraud that is committed by means of a computer system. It typically involves making illicit financial transfers through computer commands.
- 8. runs when the user launches an infected program or boots from an infected disk or USB drive. Keep a low profile because they need to spread widely without being detected
- 10. The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.
- 12. A network of computers — maybe one of the machines is yours — that scammers have infected with hidden software to secretly send spam.
- 13. Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.