Across
- 2. Software that is used to allow a hacker to access all the activity on an individual’s personal/business computer
- 4. Under this company's privacy policy, all video, photo, and message content is deleted from servers after it’s been viewed by all recipients or after 30 days.
- 5. Intentionally entering an unauthorized network system
- 8. These hackers fall somewhere in the middle. The short definition is that they violate computer laws, steal information, or shut down systems—but not for personal gain.
- 11. The specialized practice of identifying, preserving, extracting, documenting, and interpreting electronic data that can be used as evidence
- 13. Self-replicating malware program that spreads through a computer system by sending copies of itself to networked computers
- 14. Software designed with the intention to harm a computer or the information therein
- 16. Uses the same analysis techniques as computer forensics except the emphasis is placed on the Internet as a whole
Down
- 1. These hackers attempt to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- 3. Illegally gathering personal information
- 6. Hacking into a company’s internal networking system for the purpose of demonstrating or protesting a political agenda
- 7. Software designed to provide unauthor-ized access to a computer system
- 9. Ensuring that users always have accesses to their systems when required and expected, part of the CIA Triad.
- 10. Part of the CIA Triad, means that systems and data are only being access to those who are authorized to do so.
- 12. This company will always have your location data regardless of device settings
- 13. These hackers are security experts that use their technical skills to to find vulnerabilities before malicious actors do.
- 15. Security professionals ensure that data can always be trusted, part of the CIA Triad.
- 17. A copy made in the same type of media
