Module 5

1234567891011121314151617181920
Across
  1. 7. A Numeric password
  2. 9. A copy of a file, program, or media
  3. 10. A program that displays an online advertisement
  4. 12. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action
  5. 13. The process of converting data that is readable by humans into encoded characters
  6. 16. Someone who uses the Internet or network to destroy or damage computers for political reasons
  7. 17. Copying backed up files to their original location
  8. 19. Hardware and/or software that protects a network’s resources
  9. 20. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft
Down
  1. 1. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
  2. 2. A compromised computer or device
  3. 3. A program that displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services
  4. 4. A program placed on a computer or mobile device that secretly collects information
  5. 5. Someone who accesses a computer or network illegally
  6. 6. The unauthorized and illegal duplication of copyrighted software
  7. 8. The process of decoding encrypted data
  8. 11. A group of compromised computers or mobile devices connected to a network
  9. 14. A small text file that a web server stores on your computer
  10. 15. A private combination of characters associated with a user name
  11. 18. A technique intruders use to make their network or Internet transmission appear legitimate