Ch. 10 Terminology by Taryn Watford

1234567891011121314151617181920
Across
  1. 4. deceptive emails or websites to lure personal information
  2. 5. Electronic trespassing and vandalism
  3. 6. Obtaining information illegally often to use people’s credit cards
  4. 10. use of technology as tools to help law enforcement
  5. 12. Malicious network made of bots
  6. 14. any crime committed through the use of computer technology
  7. 16. stealing passwords online through deception
  8. 17. malicious software that spreads through programs
  9. 19. gate that protects internal network from unatuthorized access
  10. 20. malicious software, like viruses or worms
Down
  1. 1. Restrictions for producing publications
  2. 2. Protection through encoding
  3. 3. process of saving data
  4. 7. protecting computer systems form unauthorized and unwanted access
  5. 8. A form of software sabotage that uses computer hosts to reproduce itself
  6. 9. Designed to search for viruses, notify users and then remove viruses
  7. 11. Use of internet or other electronic means to harass an individual
  8. 13. Software robots that collect information on the web
  9. 15. Common security tool used to restrict access
  10. 18. Technology that collects information without user’s consent