Module 5

12345678910111213141516
Across
  1. 3. private combination of characters associated with the user name that allows access
  2. 5. The process of decoding encrypted data.
  3. 7. unauthorized and illegal duplication of copyrighted software
  4. 9. program that displays an online advertisement in a banner or pop-up window
  5. 10. Make a copy of a file, program, or media.
  6. 12. Hardware and/or software that protects a network’s resources
  7. 14. small text file that a web server stores on your computer.
  8. 15. Someone who accesses a computer or network illegally.
  9. 16. program placed on a computer or mobile device without the user’s knowledge that secretly collects information
Down
  1. 1. process of converting data that is readable by humans into encoded characters
  2. 2. Programs that act without a user’s knowledge and deliberately alter the operations of computers
  3. 4. program or set of instructions in a program that allows users to bypass security controls
  4. 6. Internet-based illegal acts
  5. 8. compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
  6. 11. Someone who accesses a computer or network illegally with the intent of destroying data
  7. 13. group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks