Test
Across
- 4. the activity of defrauding an online account holder of financial information by posing as a legitimate company
- 5. any malicious computer program which is used to hack into a computer by misleading users of its true intent
- 6. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- 8. a local or restricted communications network, especially a private network created using World Wide Web software
- 10. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- 1. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- 2. are small files that Web sites put on your computer hard disk drive when you first visit
- 3. algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
- 7. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- 9. a standalone malware computer program that replicates itself in order to spread to other computers