Across
- 1. cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
- 3. the ___________ agreement gives the right to use a program or app.
- 7. the illegal copying, installation, use, distribution, or sale of software in any way other than that is expressed in the license agreement
- 9. a written guidelines that helps determine whether a specific action is ethical/unethical or allowed/not allowed
- 10. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
- 11. illegal act that occurs when someone steals software media, intentionally erases programs illegally registers/activates a program or illegally copies a program
- 13. the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
- 16. biometric ________ that authenticates a person’s identity by translating a personal characteristic.
- 17. a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
Down
- 2. a notice that guarantees a user or website is legitimate
- 4. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft
- 5. programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices AKA malicious software
- 6. a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
- 8. a small text file that a web server stores on your computer
- 12. hardware/software that protects a network’s resources from intrusion by users on another network.
- 14. a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
- 15. a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services