Module 5
Across
- 3. private combination of characters associated with the user name that allows access
- 5. The process of decoding encrypted data.
- 7. unauthorized and illegal duplication of copyrighted software
- 9. program that displays an online advertisement in a banner or pop-up window
- 10. Make a copy of a file, program, or media.
- 12. Hardware and/or software that protects a network’s resources
- 14. small text file that a web server stores on your computer.
- 15. Someone who accesses a computer or network illegally.
- 16. program placed on a computer or mobile device without the user’s knowledge that secretly collects information
Down
- 1. process of converting data that is readable by humans into encoded characters
- 2. Programs that act without a user’s knowledge and deliberately alter the operations of computers
- 4. program or set of instructions in a program that allows users to bypass security controls
- 6. Internet-based illegal acts
- 8. compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
- 11. Someone who accesses a computer or network illegally with the intent of destroying data
- 13. group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks