Cengage Module 5

12345678910111213141516171819202122
Across
  1. 2. Someone who accesses a computer or network illegally.
  2. 3. A notice that guarantees a user or a website is legitimate.
  3. 5. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
  4. 7. Scam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
  5. 8. Gives you the right to work with technology on different platforms.
  6. 11. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
  7. 12. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft.
  8. 13. Cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge.
  9. 17. Someone who demands payment to stop an attack on an organization’s technology infrastructure.
  10. 20. A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
  11. 21. A program that displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.
  12. 22. Illegal act that occurs when occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program or illegally copies a program.
Down
  1. 1. Illegal act that occurs when someone steals personal or confidential information.
  2. 4. The moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
  3. 6. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. Short for malicious software.
  4. 9. A small text file that a web server stores on your computer.
  5. 10. Someone who uses the Internet or network to destroy or damage computers for political reasons.
  6. 14. A numeric password, either assigned by a company or selected by a user. Short for personal identification number.
  7. 15. The unauthorized and illegal duplication of copyrighted software.
  8. 16. The process of decoding encrypted data.
  9. 18. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  10. 19. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.