Mr. Lewin's Computer Security Crossword

123456789101112131415161718
Across
  1. 4. A person who intentionally breaks into computer systems illegally, or just somebody who knows a lot about the details of how computers and networks work.
  2. 5. Malicious (bad) software. Any software that is designed to do things that you wouldn't want it to.
  3. 7. A secret phrase or word used to confirm somebody's identity.
  4. 9. A procedure for verifying the identity of a user or machine before giving access to a computer system.
  5. 12. A program that has had its security features removed, or a program designed to remove the security features of another program.
  6. 14. A website or e-mail that pretends to be from someone you trust (like a bank, or a friend) to trick you into revealing your password or other account information.
  7. 17. A program that records all the keys being pressed by a user. Can be used by hackers, but also common in businesses and schools.
  8. 18. Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam.
Down
  1. 1. A program used to track the user's actions or preferences. Usually the goal is to collect information that can be sold to other companies.
  2. 2. A "hole" in a security system, often used to allow remote access to a system. Sometimes these are made by programmers on purpose, but they can also be the result of a virus.
  3. 3. Software that controls what data is allowed to travel between your computer and the outside world.
  4. 6. A program that can copy itself automatically, without requiring direct human action, usually by mass e-mailing itself out to an infected user's contacts.
  5. 8. An attempt to break through a security system designed to protect a computer.
  6. 10. A program that looks like useful software, but hides something bad (usually a virus) inside.
  7. 11. Data that has been modified so that meaninful information looks like random, meaningless 1s and 0s.
  8. 13. A behaviour of a program that the designers did not intend, especially one that causes the program to crash, or creates an opening for hackers.
  9. 15. A program that can copy itself by “infecting” other programs.
  10. 16. A network of computers, infected by a virus that allows them to be remotely controlled by a hacker