Across
- 3. Creates a method to keep access to a machine or network
- 4. Hackers for Good
- 7. Information not disclosed to unauthorized individuals
- 11. Purposefully Malicious Hackers
- 13. Propagates like a virus, but uses network services to move around. Executes on its own once it finds a host
- 14. Users must confirm identity to access data and systems
- 16. Computer Program/part of a program that has damaging/unwanted effects on computer
- 17. Leaving a piece of storage in an open location
- 19. Proof of delivery and proof of sender’s identity
- 20. Authorized users are able to access info quickly and easily, Systems work even during difficult times
- 21. Emails pretending to be legit companies
Down
- 1. Uses made up scenario
- 2. Data is accurate and complete, Data is not altered or destroyed
- 5. Favor for a favor
- 6. Psychological manipulation to get people to perform actions or reveal confidential information
- 8. Gathers data and sends it to another entity
- 9. Hundreds or millions of computer that have been compromised
- 10. Sits quietly until a condition is met
- 12. Looks like something useful. Could install backdoors, rootkits, or turn your machine into a zombie
- 15. Self-replicating software, attaches to another program or file. Only runs when the program or file is opened.
- 18. Follow authorized user into secure area
