Chapter 2 Puzzle

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 2. A self-replicating computer virus.
  2. 4. A confidential string of characters that a user enters (along with a user name) in order to be authenticated.
  3. 6. A form of spyware software that collects information about the user in order to display user-targeted advertisements.
  4. 8. An acronym for "Spam over Instant Messaging;" the perpetrators are called spimmers.
  5. 12. The transformation of data into a code that can only be decrypted through the use of a secret key or password.
  6. 15. Unsolicited email, (most often seeking financial gain for the sender). This includes email from a legitimate source selling a real service or product, but if you did not give them permission to send such information to you, it is considered spam.
  7. 16. A person who breaks laws using computer technology.
  8. 17. A malware attack that takes advantage of some vulnerability in our computers or networks.
  9. 18. Someone who uses a computer to cause destruction without regard to its effect on humanity.
  10. 19. Another name for a keystroke logger.
  11. 20. A group of networked computers that, usually unbeknown to their owners, have been infected with programs that forward information to other computers over the network.
  12. 21. The act of covertly obtaining information broadcast from wireless devices using the Bluetooth standard, a short-range wireless standard used for data exchange between computers and mobile devices.
  13. 24. Validation of a user account and password that occurs before the security components of an OS give a user access to the computer network.
  14. 26. A server created as a decoy to draw malware attacks and gather information about attackers.
  15. 28. Very small text files an Internet browser saves on the local hard drive at the request of a web site.
  16. 29. A category of software that runs surreptitiously on a user's computer, gathers information without permission from the user, and then sends that information to the people or organizations that requested the information.
  17. 30. The use of deceit and trickery to persuade someone to hand over money or other valuables.
  18. 32. A person who initiates and controls a botnet.
  19. 34. Similar to a Trojan Horse (see below), an advertisement that appears to be something harmless and that offers to take some action, such as pretending to scan your computer for problems, but the results will be bogus.
  20. 35. Malicious software. Any software security threat.
Down
  1. 1. Malware that threatens to do damage or lock the victim out of a computer unless he or she pays a fee.
  2. 3. Malware that hides itself from detection by anti-malware programs by concealing itself within the OS code or in any other program running on the computer.
  3. 5. A physical device that can be used in authentication, either alone or together with a user name and password.
  4. 7. An individual computer in a botnet, so-called because it mindlessly serves the person who originated the botnet.
  5. 9. A fraudulent method of obtaining personal financial information through web page pop-ups, email, and even via letters mailed via the postal service.
  6. 10. A hardware device or software that protects a network or computer by examining traffic and rejecting certain traffic based on a set of rules.
  7. 11. Someone with a great deal of computer programming skills who invades private computers and networks.
  8. 13. The use of computers to cause destruction without regard to its effect on humanity.
  9. 14. The process of both authenticating a user and determining the permissions that the user has for a resource.
  10. 18. Illegal activity performed using computer technology.
  11. 22. An online payment system.
  12. 23. A mode by which malware infects a computer.
  13. 25. A program that is installed and activated on a computer by appearing to be something harmless, which the user innocently installs. This is a common way that a virus or a worm can infect a computer.
  14. 26. A Wi-Fi network that connects to the Internet through a router.
  15. 27. The information that accompanies a message but does not appear in the message.
  16. 31. A program that is installed and activated on a computer without the knowledge or permission of the user. At the least the intent is mischief, but most often it intends to be genuinely damaging in one way or another.
  17. 33. Named for a wartime demilitarized zone, a network between the internal network and the Internet with a firewall on both sides.