Module 3: Data Safety and Security

1234567891011121314
Across
  1. 3. User who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
  2. 5. Program that secretly collects information about the user and send the gathered information to the outside source while the user is online.
  3. 6. A kind of malware that replicates itself causing a computer to shutdown
  4. 9. Small text file that contains data about the user and his/her viewing preferences a web server stores on the computer.
  5. 10. Computer enthusiast who accesses a computer or network illegally and claim the intent of his/her security breaches.
  6. 12. Cyber __________ are perpetrators who demand payment to stop an attack on an organization’s technology infrastructure.
  7. 13. a kind of malware that alters how computer works
  8. 14. A program that performs repetitive task on a network.
Down
  1. 1. Software ________ refers to unauthorized and illegal duplication of copyrighted software.
  2. 2. is the process of converting data that is readable by humans into ciphertext to prevent unauthorized access.
  3. 4. Cyber __________ an attack whose goal ranges from disabling a government’s computer network to crippling a country
  4. 5. a technique that intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  5. 7. An image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.
  6. 8. A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
  7. 11. a kind of malware that displays online advertisement in a form of a banner or pop-ups