Chapter 05 Final, Digital Security, Ethics, And Privacy

1234567891011121314151617181920212223242526
Across
  1. 1. Internet advertising firms often use what to collect information about users web browsing habits?
  2. 3. What is a program or set of instructions in a program that allows users to bypass security controls?
  3. 4. Is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal information?
  4. 6. What term for a website that uses encryption techniques to protect its data?
  5. 10. Is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  6. 13. What categories are the rights to which creators are entitled for their work?
  7. 14. Is someone who demands payment in order to stop an attach on an organization's technology infrastructure?
  8. 15. What refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
  9. 18. What is the process of restricting access to certain material on the web?
  10. 20. In which particular devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks?
  11. 23. Is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
  12. 24. What term means in a location separate from the computer site?
  13. 25. What term is used to describe software used by cybercriminals?
  14. 26. What gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
Down
  1. 1. It has the same intent as a cracker, but does not have the technical skills and knowledge?
  2. 2. Computer viruses, worms, Trojan horses, and rootkits are classified as what?
  3. 5. What can transmit germs
  4. 7. What occurs when someone steals personal or confidential information?
  5. 8. What is the term to read encrypted data, the recipient must decipher it into a readable form?
  6. 9. Many websights require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources.
  7. 11. What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
  8. 12. Is someone who uses the Internet or network to destroy or damage computers for political reasons?
  9. 16. What is the term for a program that performs a a repetitive task on a network?
  10. 17. Websites use what to keep track of items in a user's shopping cart?
  11. 19. What type of individual may steal credit card numbers to make fraudulent purchases?
  12. 21. What term refers to making a copy of a file?
  13. 22. An IT code of conduct is a written guideline that helps determine whether a specific computer action is what?