Across
- 1. Crime that involves a computer and/or a network
- 4. Someone who uses a computer to gain access to systems or networks
- 6. Malicious attempts by hackers to damage, steal, or destroy a computer
- 8. Software that allows an attacker to obtain information on another computer
- 9. Links two or more devices
- 10. Descriptive data that contains information about other data
- 12. In 1988, Robert __________ unleashed a malicious computer program
- 14. Positions ideal for individuals with more than five years of experience
- 19. Web browser feature
- 20. Do not share ____________ across multiple sites
- 22. Internet connection that encrypts traffic from a device to a private network
- 23. software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- 2. Online harassment that uses electronic communication
- 3. Attacker sends fraudulent emails to deceive someone into revealing information
- 5. , Describes the digital environment in which computer networks communicate
- 7. A type of malicious software
- 11. Someone who uses the internet to cause harm to a victim
- 13. ___________ engineering is when an attacker manipulates someone into revealing information
- 15. Software that automatically displays or downloads advertising material
- 16. Store information across pages within the site
- 17. A trail of data intentionally left behind by a user
- 18. Personally identifiable information
- 21. A standalone self-replicating software application that invades and destroys computers
