Across
- 4. deceptive emails or websites to lure personal information
- 5. Electronic trespassing and vandalism
- 6. Obtaining information illegally often to use people’s credit cards
- 10. use of technology as tools to help law enforcement
- 12. Malicious network made of bots
- 14. any crime committed through the use of computer technology
- 16. stealing passwords online through deception
- 17. malicious software that spreads through programs
- 19. gate that protects internal network from unatuthorized access
- 20. malicious software, like viruses or worms
Down
- 1. Restrictions for producing publications
- 2. Protection through encoding
- 3. process of saving data
- 7. protecting computer systems form unauthorized and unwanted access
- 8. A form of software sabotage that uses computer hosts to reproduce itself
- 9. Designed to search for viruses, notify users and then remove viruses
- 11. Use of internet or other electronic means to harass an individual
- 13. Software robots that collect information on the web
- 15. Common security tool used to restrict access
- 18. Technology that collects information without user’s consent
