Module 5 Vocabulary Crossword Puzzle
Across
- 2. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
- 5. Make a copy of a file, program, or media.
- 7. Hardware and/or software that protects a network’s resources from intrusion by users on another network, such as the Internet.
- 8. The unauthorized and illegal duplication of copyrighted software.
- 11. An object that can be tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-under ad, or in an email message or text message contains a malicious program.
- 12. An attack whose goal ranges from disabling a government’s computer network to crippling a country.
- 14. The process of decoding encrypted data.
- 15. A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
- 17. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
- 18. A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
- 19. Creates software registration numbers and sometimes activation codes.
- 20. The discovery, collection, and analysis of evidence found on computers and networks. See also cyberforensics
Down
- 1. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
- 3. A small text file that a web server stores on your computer.
- 4. Destructive event or prank
- 6. Someone who accesses a computer or network illegally.
- 9. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
- 10. Someone who demands payment to stop an attack on an organization’s technology infrastructure.
- 13. A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
- 16. The encrypted (scrambled) data