Ethical Computer Use Crossword!

1234567891011121314151617
Across
  1. 4. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it
  2. 5. attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a website
  3. 6. The state of being free from danger, threat, or breach of personal info
  4. 8. an error, fault or flaw in any computer program or a hardware system
  5. 10. a security program designed to prevent, detect, search and remove viruses
  6. 12. a person who breaks into a computer system
  7. 14. the programs and other operating information used by a computer.
  8. 15. intrusive software developed by hackers to steal data and damage or destroy computers and computer systems
  9. 16. attempts to steal, expose, alter, disable, or destroy another's assets through unauthorized access to computer systems
  10. 17. a worldwide system of computer networks
Down
  1. 1. the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, and other personal information
  2. 2. a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
  3. 3. connected to, served by, or available through a system and especially a computer or telecommunications system
  4. 4. a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or hardware
  5. 7. a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program
  6. 9. The ability to keep your personal information safe from others
  7. 10. The process of verifying the claimed identity of a user, device, or other entity in a computer system
  8. 11. any unsolicited communication sent in bulk
  9. 13. the act of stealing information stored on corporate databases, computers, servers, or electronic devices to obtain sensitive information or compromise privacy