Cengage Module 5

12345678910111213141516171819
Across
  1. 2. Someone who accesses a computer or network illegally.
  2. 4. Someone who demands payment to stop an attack on an organization’s technology infrastructure.
  3. 6. The moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
  4. 7. The unauthorized and illegal duplication of copyrighted software.
  5. 9. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
  6. 10. A notice that guarantees a user or a website is legitimate.
  7. 12. A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
  8. 13. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
  9. 14. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft.
  10. 15. The process of decoding encrypted data.
  11. 18. Gives you the right to work with technology on different platforms.
  12. 19. Illegal act that occurs when someone steals personal or confidential information.
Down
  1. 1. Cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge.
  2. 3. A small text file that a web server stores on your computer.
  3. 5. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. Short for malicious software.
  4. 7. Scam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
  5. 8. A numeric password, either assigned by a company or selected by a user. Short for personal identification number.
  6. 11. A program that displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.
  7. 12. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  8. 14. Someone who uses the Internet or network to destroy or damage computers for political reasons.
  9. 16. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
  10. 17. Illegal act that occurs when occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program or illegally copies a program.