Chapter 10 : Digital Security & Ethics

1234567891011121314151617181920212223242526272829
Across
  1. 2. : Compromised computer used in a botnet.
  2. 4. : Blocks unauthorized network access.
  3. 8. : Common way for malware to spread via email.
  4. 9. : Device that guards against electrical surges.
  5. 11. : Actions to return to full processing capability.
  6. 12. : Using digital tools to harass or threaten others.
  7. 16. : Setting to control macro behavior in software.
  8. 21. : Prolonged malfunction of a computer.
  9. 22. : Online behavior rules and manners.
  10. 24. : Plan to restore operations after a disaster.
  11. 25. : How you're represented online to others.
  12. 26. : Malware disguised as a legitimate program.
  13. 27. : Software that detects and removes malware.
  14. 29. : Legal protection for original digital content.
Down
  1. 1. : Unique code used to identify a virus.
  2. 3. : An event that could damage computer hardware or data.
  3. 5. : How backup files are used to resume operations.
  4. 6. : Group of infected computers controlled remotely.
  5. 7. : Portable storage that should be scanned before use.
  6. 10. : Malware that copies itself and drains system resources.
  7. 13. : Immediate steps taken after a disaster.
  8. 14. : Any illegal act involving a computer or device.
  9. 15. : Internet-based illegal activity.
  10. 17. : Provides backup power during outages.
  11. 18. : Program that damages computers and spreads.
  12. 19. : License that allows sharing with conditions.
  13. 20. : Hidden method to bypass system security.
  14. 23. : Larger version of a denial-of-service attack.
  15. 24. : Attack that disrupts access to online services.
  16. 28. : Simulates disaster to test recovery ability.