Chapter 05 Final, Digital Security, Ethics, And Privacy

123456789101112131415161718192021222324252627
Across
  1. 2. What term refers to making a copy of a file?
  2. 4. Many websights require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources.
  3. 7. Computer viruses, worms, Trojan horses, and rootkits are classified as what?
  4. 8. An IT code of conduct is a written guideline that helps determine whether a specific computer action is what?
  5. 11. What refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
  6. 16. What can transmit germs
  7. 17. What gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
  8. 19. What term for a website that uses encryption techniques to protect its data?
  9. 20. Websites use what to keep track of items in a user's shopping cart?
  10. 22. What type of individual may steal credit card numbers to make fraudulent purchases?
  11. 23. What occurs when someone steals personal or confidential information?
  12. 25. What categories are the rights to which creators are entitled for their work?
  13. 26. What is the term to read encrypted data, the recipient must decipher it into a readable form?
  14. 27. Is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal information?
Down
  1. 1. Is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  2. 3. Is someone who uses the Internet or network to destroy or damage computers for political reasons?
  3. 5. In which particular devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks?
  4. 6. What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
  5. 9. Is someone who demands payment in order to stop an attach on an organization's technology infrastructure?
  6. 10. Internet advertising firms often use what to collect information about users web browsing habits?
  7. 12. What is a program or set of instructions in a program that allows users to bypass security controls?
  8. 13. What is the process of restricting access to certain material on the web?
  9. 14. Is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
  10. 15. What term is used to describe software used by cybercriminals?
  11. 18. It has the same intent as a cracker, but does not have the technical skills and knowledge?
  12. 21. What term means in a location separate from the computer site?
  13. 24. What is the term for a program that performs a a repetitive task on a network?