Mr. Lewin's Computer Security Crossword
Across
- 4. A person who intentionally breaks into computer systems illegally, or just somebody who knows a lot about the details of how computers and networks work.
- 5. Malicious (bad) software. Any software that is designed to do things that you wouldn't want it to.
- 7. A secret phrase or word used to confirm somebody's identity.
- 9. A procedure for verifying the identity of a user or machine before giving access to a computer system.
- 12. A program that has had its security features removed, or a program designed to remove the security features of another program.
- 14. A website or e-mail that pretends to be from someone you trust (like a bank, or a friend) to trick you into revealing your password or other account information.
- 17. A program that records all the keys being pressed by a user. Can be used by hackers, but also common in businesses and schools.
- 18. Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam.
Down
- 1. A program used to track the user's actions or preferences. Usually the goal is to collect information that can be sold to other companies.
- 2. A "hole" in a security system, often used to allow remote access to a system. Sometimes these are made by programmers on purpose, but they can also be the result of a virus.
- 3. Software that controls what data is allowed to travel between your computer and the outside world.
- 6. A program that can copy itself automatically, without requiring direct human action, usually by mass e-mailing itself out to an infected user's contacts.
- 8. An attempt to break through a security system designed to protect a computer.
- 10. A program that looks like useful software, but hides something bad (usually a virus) inside.
- 11. Data that has been modified so that meaninful information looks like random, meaningless 1s and 0s.
- 13. A behaviour of a program that the designers did not intend, especially one that causes the program to crash, or creates an opening for hackers.
- 15. A program that can copy itself by “infecting” other programs.
- 16. A network of computers, infected by a virus that allows them to be remotely controlled by a hacker