Across
- 1. Internet advertising firms often use what to collect information about users web browsing habits?
- 3. What is a program or set of instructions in a program that allows users to bypass security controls?
- 4. Is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal information?
- 6. What term for a website that uses encryption techniques to protect its data?
- 10. Is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
- 13. What categories are the rights to which creators are entitled for their work?
- 14. Is someone who demands payment in order to stop an attach on an organization's technology infrastructure?
- 15. What refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
- 18. What is the process of restricting access to certain material on the web?
- 20. In which particular devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks?
- 23. Is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
- 24. What term means in a location separate from the computer site?
- 25. What term is used to describe software used by cybercriminals?
- 26. What gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
Down
- 1. It has the same intent as a cracker, but does not have the technical skills and knowledge?
- 2. Computer viruses, worms, Trojan horses, and rootkits are classified as what?
- 5. What can transmit germs
- 7. What occurs when someone steals personal or confidential information?
- 8. What is the term to read encrypted data, the recipient must decipher it into a readable form?
- 9. Many websights require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources.
- 11. What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
- 12. Is someone who uses the Internet or network to destroy or damage computers for political reasons?
- 16. What is the term for a program that performs a a repetitive task on a network?
- 17. Websites use what to keep track of items in a user's shopping cart?
- 19. What type of individual may steal credit card numbers to make fraudulent purchases?
- 21. What term refers to making a copy of a file?
- 22. An IT code of conduct is a written guideline that helps determine whether a specific computer action is what?
