RU ITEC411
Across
- 1. – Unwanted bulk email messages.
- 3. – Security system that blocks unauthorized access to a network.
- 7. – Legal protection for creative works.
- 8. – Deception intended for financial or personal gain.
- 10. - Program that attaches to files and spreads when those files are shared.
- 11. – (__ of Service) Attack that floods a system with traffic to make it unusable.
- 15. – Right to control personal information.
- 17. – Process of scrambling data to protect confidentiality.
- 18. - Fraudulent emails or websites that trick users into revealing personal information.
Down
- 1. – Persistent unwanted monitoring or following online.
- 2. – the kind of theft that means stealing personal information to impersonate someone.
- 4. – Rules enforced by government to regulate behavior.
- 5. – Self-replicating program that spreads independently across networks.
- 6. – Harassment or intimidation carried out through digital communication.
- 9. – Illegal copying or distribution of software, music, or movies.
- 12. – Moral principles guiding responsible technology use.
- 13. - Software created to damage, disrupt, or gain unauthorized control of systems.
- 14. – Malicious program disguised as legitimate software.
- 16. – Measures taken to protect systems and data.
- 19. - Person who gains unauthorized access to computer systems.